On Christmas Day last month, Microsoft and Sony PlayStation networks were attacked by a group of hackers calling themselves the Lizard Squad. This DDoS (distributed denial-of-service) attack floods servers which makes them unable to function and caused significant disruptions.
After a joint investigation between the British police and the U.S.? Federal Bureau of Investigation, an 18 year-old has been arrested in connection with said cyber attacks, The Independent reported.
Described as “quiet” by neighbors
U.K. authorities declined to name the suspect publicly. However, the Daily Mail mentioned that the teenager is named Jordan Lee-Bevan and was arrested in his home at Southport, Merseyside, near Liverpool, England.
Lee-Bevan is described as a quiet teenager by his neighbors, one who barely left his bedroom. During the raid, officers seized his computers and took him away in a police car.
This arrest is part of combined operation of the South East Regional Organised Crime Unit (SEROCU) and the North West Regional Crime Unit, supported by the U.K.?s National Cyber Crime Unit (NCCU).
Also involved in “swatting”
In a BBC report, SEROCU?s Cyber Crime Unit head Craig Jones mentioned, “This investigation is a good example of joint law enforcement co-operation in relation to a type of criminality that is not restricted by any geographical boundaries.?
Jones also explained a little more one of the suspect?s charges known as ?swatting.? He said that those offences ?involve law enforcement forces in the United States receiving hoax calls via Skype for a major incident in which Swat teams were dispatched.”
Lizard Squad DDoS service hacked
Meanwhile, it looks like the Lizard Squad has just been given a dose of its own medicine. American security journalist Brian Krebs reports that the Lizardstresser.su website, home to the group?s DDos-for-hire service, has been compromised.
The website is where the hackers endorse their LizardStresser tool which works by using thousands of hacked residential routers in order to carry out DDoS attacks. According to Krebs, there are documents indicating that the tool managed to attract over 14,000 registered users but only a few have funded accounts. Those paying customers reportedly deposited bitcoins equivalent to more than $11,000.