www.lakeridge.us
Open in
urlscan Pro
2600:1f18:2489:8200::c8
Public Scan
Submitted URL: https://lakeridge.us/14-year-old-takes-down-amazon-cmmc-and-ddos
Effective URL: https://www.lakeridge.us/14-year-old-takes-down-amazon-cmmc-and-ddos
Submission: On January 04 via api from US — Scanned from US
Effective URL: https://www.lakeridge.us/14-year-old-takes-down-amazon-cmmc-and-ddos
Submission: On January 04 via api from US — Scanned from US
Form analysis
2 forms found in the DOMPOST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c
<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c" method="POST" id="join-our-newsletter">
<input type="hidden" name="LEADSOURCE" value="14 year old boy takes down Amazon, CNN, Yahoo!, and eBay. Also CMMC and DDoS Attacks...">
<div class="form-group row">
<label for="first_name">Name*</label>
<input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
</div>
<div class="form-group row">
<label for="email">Email*</label>
<input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
</div>
<div class="form-group row">
<label for="company">Company*</label>
<input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
</div>
<div class="form-group row mt-3">
<div class="d-grid">
<input class="btn btn-primary" type="submit" value="Submit">
</div>
</div>
</form>
POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c
<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c" method="POST" id="join-our-newsletter-blog">
<input type="hidden" name="LEADSOURCE" value="14 year old boy takes down Amazon, CNN, Yahoo!, and eBay. Also CMMC and DDoS Attacks...">
<div class="form-group row">
<label for="first_name">Name*</label>
<input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
</div>
<div class="form-group row">
<label for="email">Email*</label>
<input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
</div>
<div class="form-group row">
<label for="company">Company*</label>
<input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
</div>
<div class="form-group row mt-3">
<div class="d-grid">
<input class="btn btn-primary" type="submit" value="Submit">
</div>
</div>
</form>
Text Content
JOIN OUR NEWSLETTER Name* Email* Company* * Compliance Solutions NIST SP 800-171 & CMMC COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements. Learn More HIPAA COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements. Learn More FAR 52.204-21 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements. Learn More ISO 27001 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements. Learn More * About * Contact Login Book a Call 14 YEAR OLD BOY TAKES DOWN AMAZON, CNN, YAHOO!, AND EBAY. ALSO CMMC AND DDOS ATTACKS... A 14 year old boy took down Amazon, CNN, Yahoo!, and eBay...well 20 years ago that is, but still very impressive. Who is he? How did he do it? Why did he do it? Was he Caught? What damage did he cause? And where is he now? -------------------------------------------------------------------------------- * email * facebook * twitter * reddit Join Our Newsletter Join our newsletter: Name* Email* Company* WHICH HACKER BROUGHT DOWN AMAZON, CNN, YAHOO! AND EBAY? MafiaBoy, real name Michael Calce, was the hacker that brought down Yahoo!, Fifa.com, Amazon.com, E*TRADE, eBay, and CNN. He was born in 1986 in the West Island area of Montreal, Quebec. At the age of six his dad bought him his own computer, it had a profound effect on him, Mafiaboy says “There was something intoxicating about the idea of dictating everything the computer did, down to the smallest of functions. The computer gave me, a six-year-old, a sense of control and command. Nothing else in my world operated that way". HOW DID MAFIABOY BRING DOWN AMAZON, CNN, YAHOO!, AND EBAY? On February 7, 2000, MafiaBoy launched project Rivolta, meaning "rebellion" in Italian. First targeting Yahoo!, the world's top search engine and a multibillion-dollar web company. Rivolta was a denial-of-service attack in which servers become overwhelmed with requests to the point where normal traffic is unable to be processed and they become unresponsive to commands. Over the next week MafiaBoy brought down eBay, CNN, and Amazon. WHY DID MAFIABOY BRING DOWN AMAZON, CNN, YAHOO!, AND EBAY? According to MafiaBoy, his goal was to establish himself and his hacker/cybergroup, TNT, online/in the cyberworld. WAS THE HACKER MAFIABOY CAUGHT FOR BRINGING DOWN AMAZON, CNN, YAHOO!, AND EBAY? Soon after the attacks both the U.S. Federal Bureau of Investigation and the Royal Canadian Mounted Police conducted an investigation into who was behind the cyber attacks that brought down Amazon, CNN, Yahoo!, and eBay. MafiaBoy recounts "You know I'm a pretty calm, collected, cool person, but when you have the president of the United States and attorney general basically calling you out and saying 'We're going to find you' ... at that point I was a little bit worried,I started to notice this utility van that was parked at the end of my street at, like, Sunday at 4 a.m., It was pretty obvious that they were surveilling my place.". The case eventually went to trial in Canada and was sentenced on September 12, 2001 to eight months of "open custody," one year of probation, restricted use of the Internet, and a small fine. HOW MUCH DAMAGE DID MAFIABOY CAUSE BY BRINGING DOWN AMAZON, CNN, YAHOO!, AND EBAY? It’s not exactly sure how much monetary damage his attacks caused but estimates range from roughly $7.5 million, according to the trial prosecutor, and $1.2 billion in global economic damages, according to Matthew Kovar (a senior analyst at a market research firm). WHERE IS MAFIABOY TODAY? Today Michael Calce runs a company called Optimal Secure that tries to find weak points in company networks and helps businesses understand just how vulnerable they are. CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) AND DDOS ATTACKS. Some CMMC practices related to distributed denial of service attacks include incident response, firewall configuration, and logging. Companies with CMMC requirements are required to deploy a firewall. This can help prevent DDOS attacks from impacting systems on the internal network. Companies with CMMC level two or higher requirements need to have incident response procedures in place. This includes preparing incident response personnel for incidents, developing a plan to contain incidents such as DDOS attacks, and how to recover from attacks. Companies with level two and higher CMMC requirements will need to monitor their systems for signs of an attack, this includes DDOS attacks. This generally involves leveraging an intrusion detection system. If you would like more information on CMMC related requirements feel free to reach out to us at info@lakeridge.us. Quick & Simple DISCOVER OUR CYBERSECURITY COMPLIANCE SOLUTIONS: Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you NIST SP 800-171 & CMMC COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements. Learn More HIPAA COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements. Learn More FAR 52.204-21 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements. Learn More ISO 27001 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements. Learn More CYBERSECURITY COMPLIANCE QUICK. SIMPLE. AFFORDABLE. GET STARTED TODAY Book a Discovery Call * * * * PRODUCT * Login * Register * Forgotten password * NIST SP 800-171 & CMMC Compliance * HIPAA Compliance * FAR 52.204-21 Compliance * ISO 27001 Compliance COMPANY * About us * Join our team * Affiliate Program * Contact us RESOURCES * Our blog * HIPAA Handbook * NIST SP 800-171 & CMMC 2.0 Handbook * CMMC 1.0 Handbook LEGALS * Privacy policy * Terms & conditions * Security * Sitemap All rights reserved © Lake Ridge Technologies 2024