An Oregon man is facing federal allegations on the allegations, revolving on several large -scale cyber attacks over the years, the federal officials announced on Tuesday.
22 -year -old Ethan Foltz has allegedly developed a network of devices such as “wrapped” botnet, digital video recorder and WiFi router which has become infected with malware and is used to operate a type of cybercatac to close a type of cybercate to close the attacks of service (DDOS). Attorney office in Alaska district. Prosecutors stated that the network is “currently one of the most sophisticated and powerful DDOS-Hare Botnets in existence.”
Prosecutors said the law enforcement officials stopped the attacks on 6 August after carrying out a search warrant at Foltz’s house in Eugene, Oregon and attaining administrative control of their botnet.
The court documents alleged that Foltz gave a loan of “rapper bot” to the customers to pay the victims in more than 80 countries, including an US government network, a social media platform and US tech companies. The news release of the Department of Justice did not disclose the specific victims.
According to the prosecution, the “rapper bot” was controlling around 65,000 to 95,000 infected equipment and to send large -scale data using them, about 2 to 3 terabits per second, to overwhelm the bandwidth of the target. Investigators stated that at least five infected victims were in Alaska.
The prosecutors said that Folts have been charged with a count of assistance and removing computer infiltration. If convicted, he can withstand a prison of up to 10 years. It was not immediately clear whether Foltz has a legal representation.
Kenneth Daselis, a special agent of the Department of Inspector General’s Defense Office, said the allegation against Folts “throws light on the efforts to disrupt and decompose emerging cyber threats that target the defense department and defense industrial base.”
Officials said the case is part of Operation Poweroff, the objective of an ongoing international law enforcement effort, which aims to destroy criminal DDOS-For-Hire Infrastructures worldwide.
In December 2024, federal officials 27 internet domains seized DDOS-for-Higer Join and accused two people who allegedly oversee services.