Spamhaus seeks arrests of non-EU DDoS attackers
Spamhaus seeks arrests of non-EU DDoS attackers

Spamhaus, the veteran anti-spam organisation, has welcomed the arrests of two alleged DDoS attackers against its servers, but wants global law enforcement officers to arrest five more people apparently also known to have been behind the campaign.

The arrest of a UK and Dutch citizen, says the non-profit organisation, is a step in the right direction, but it also wants to see arrests of the other five suspects, who are reported to be in the US, Russia and China.

The alleged DDoS attackers were reportedly involved in a distributed denial of service attack - known as Stophaus - against Spamhaus servers in March of last year.

Stophaus was considered by many to be one of the industry's largest DDoS attacks of type, and used spoofed requests sent via open DNS servers to swamp the company's servers. Some reports suggested that the efficiency of several European Internet nodes was also reduced as a result of the attacks.

In a blog post published yesterday by Quentin Jenkins, a security researcher with the organisation, Spamhaus thanked the law enforcement community in the matter of the massive DDoS attack staged against its systems in March of last year.

"This time we offer our congratulations and thanks to the UK's National Cyber Crime Unit (NCCU), the cybercrime arm of the National Crime Agency (NCA)," he added, noting that a 17-year-old Londoner was charged late last month with computer misuse, fraud and money laundering offences.

Jenkins says that this was the first formal announcement of the arrest, which took place last year, shortly after the arrest of a Dutch national living in Spain, who has been charged by the Dutch Public Prosecution Service for leading the gang who carried out the DDoS attack.

The case, he noted, is proceeding through the Dutch legal system.