Last Updated: 2017-09-21 20:09:42 UTC
by Brad Duncan (Version: 1)
As a follow-up to one of our June 2017 diaries asking people to forward us any DDoS threats, we received yet another example:
Since 2017-09-19, at least 4 people have tweeted about the same type of emails, supposedly from Phantom Squad:
This feels like a scam using the notariety of Phantom Squad's name, because the group has gotten some fairly high-profile press coverage in recent years. In December 2015, Phantom Squad claimed responsibility for a DDoS attack against Xbox Live. A year later in December 2016, Phantom Squad was apparently involved in a DDoS attack against Steam. However, I haven't found any evidence yet this group is involved in small business extortion.
Wheter or not this email is legitimate or fake, they all use notariety of the group's name to make the threat sound plausible.
In our June 2017 diary about fake DDoS extortion emails, Johannes Ullrich provides some guidance for people that receive these types of messages. Tips include:
- Verify your DDoS plan: Do you have an agreement with an anti-DDoS provider? A contact at your ISP? If so, make sure everything is set up and working right.
- Attackers often run short tests before launching a DDoS attack. Can you find any evidence of that? Has there been a brief, unexplained traffic spike? If so, take a closer look. The threat is more serious if you detect an actual test, because the purpose of a test is often to assess the firepower needed to DDoS your network.
Thanks to everyone who already forwarded examples to us. As Johannes previously asked in June 2017, please continue to forward us any similar emails. We can always use the additional data.
brad [at] malware-traffic-analysis.net