www.lakeridge.us Open in urlscan Pro
2600:1f18:2489:8200::c8  Public Scan

Submitted URL: https://lakeridge.us/14-year-old-takes-down-amazon-cmmc-and-ddos
Effective URL: https://www.lakeridge.us/14-year-old-takes-down-amazon-cmmc-and-ddos
Submission: On January 04 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c

<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&amp;id=2ee620784c" method="POST" id="join-our-newsletter">
  <input type="hidden" name="LEADSOURCE" value="14 year old boy takes down Amazon, CNN, Yahoo!, and eBay. Also CMMC and DDoS Attacks...">
  <div class="form-group row">
    <label for="first_name">Name*</label>
    <input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
  </div>
  <div class="form-group row">
    <label for="email">Email*</label>
    <input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
  </div>
  <div class="form-group row">
    <label for="company">Company*</label>
    <input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
  </div>
  <div class="form-group row mt-3">
    <div class="d-grid">
      <input class="btn btn-primary" type="submit" value="Submit">
    </div>
  </div>
</form>

POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c

<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&amp;id=2ee620784c" method="POST" id="join-our-newsletter-blog">
  <input type="hidden" name="LEADSOURCE" value="14 year old boy takes down Amazon, CNN, Yahoo!, and eBay. Also CMMC and DDoS Attacks...">
  <div class="form-group row">
    <label for="first_name">Name*</label>
    <input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
  </div>
  <div class="form-group row">
    <label for="email">Email*</label>
    <input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
  </div>
  <div class="form-group row">
    <label for="company">Company*</label>
    <input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
  </div>
  <div class="form-group row mt-3">
    <div class="d-grid">
      <input class="btn btn-primary" type="submit" value="Submit">
    </div>
  </div>
</form>

Text Content

JOIN OUR NEWSLETTER

Name*
Email*
Company*

 * Compliance Solutions
   
   NIST SP 800-171 & CMMC COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with NIST SP 800-171 and CMMC requirements.
   
   Learn More
   
   HIPAA COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with HIPAA security rule requirements.
   
   Learn More
   
   FAR 52.204-21 COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information
   Systems requirements.
   
   Learn More
   
   ISO 27001 COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with ISO 27001 requirements.
   
   Learn More
 * About
 * Contact

Login Book a Call




14 YEAR OLD BOY TAKES DOWN AMAZON, CNN, YAHOO!, AND EBAY. ALSO CMMC AND DDOS
ATTACKS...

A 14 year old boy took down Amazon, CNN, Yahoo!, and eBay...well 20 years ago
that is, but still very impressive. Who is he? How did he do it? Why did he do
it? Was he Caught? What damage did he cause? And where is he now?

--------------------------------------------------------------------------------

 * email
 * facebook
 * twitter
 * reddit

Join Our Newsletter
Join our newsletter:
Name*
Email*
Company*



WHICH HACKER BROUGHT DOWN AMAZON, CNN, YAHOO! AND EBAY?

MafiaBoy, real name Michael Calce, was the hacker that brought down Yahoo!,
Fifa.com, Amazon.com, E*TRADE, eBay, and CNN. He was born in 1986 in the West
Island area of Montreal, Quebec. At the age of six his dad bought him his own
computer, it had a profound effect on him, Mafiaboy says “There was something
intoxicating about the idea of dictating everything the computer did, down to
the smallest of functions. The computer gave me, a six-year-old, a sense of
control and command. Nothing else in my world operated that way".




HOW DID MAFIABOY BRING DOWN AMAZON, CNN, YAHOO!, AND EBAY?

On February 7, 2000, MafiaBoy launched project Rivolta, meaning "rebellion" in
Italian. First targeting Yahoo!, the world's top search engine and a
multibillion-dollar web company. Rivolta was a denial-of-service attack in which
servers become overwhelmed with requests to the point where normal traffic is
unable to be processed and they become unresponsive to commands. Over the next
week MafiaBoy brought down eBay, CNN, and Amazon.


WHY DID MAFIABOY BRING DOWN AMAZON, CNN, YAHOO!, AND EBAY?

According to MafiaBoy, his goal was to establish himself and his
hacker/cybergroup, TNT, online/in the cyberworld.


WAS THE HACKER MAFIABOY CAUGHT FOR BRINGING DOWN AMAZON, CNN, YAHOO!, AND EBAY?

Soon after the attacks both the U.S. Federal Bureau of Investigation and the
Royal Canadian Mounted Police conducted an investigation into who was behind the
cyber attacks that brought down Amazon, CNN, Yahoo!, and eBay. MafiaBoy recounts
"You know I'm a pretty calm, collected, cool person, but when you have the
president of the United States and attorney general basically calling you out
and saying 'We're going to find you' ... at that point I was a little bit
worried,I started to notice this utility van that was parked at the end of my
street at, like, Sunday at 4 a.m., It was pretty obvious that they were
surveilling my place.". The case eventually went to trial in Canada and was
sentenced on September 12, 2001 to eight months of "open custody," one year of
probation, restricted use of the Internet, and a small fine.



HOW MUCH DAMAGE DID MAFIABOY CAUSE BY BRINGING DOWN AMAZON, CNN, YAHOO!, AND
EBAY?

It’s not exactly sure how much monetary damage his attacks caused but estimates
range from roughly $7.5 million, according to the trial prosecutor, and $1.2
billion in global economic damages, according to Matthew Kovar (a senior analyst
at a market research firm).


WHERE IS MAFIABOY TODAY?

Today Michael Calce runs a company called Optimal Secure that tries to find weak
points in company networks and helps businesses understand just how vulnerable
they are.


CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) AND DDOS ATTACKS.

Some CMMC practices related to distributed denial of service attacks include
incident response, firewall configuration, and logging. Companies with CMMC
requirements are required to deploy a firewall. This can help prevent DDOS
attacks from impacting systems on the internal network. Companies with CMMC
level two or higher requirements need to have incident response procedures in
place. This includes preparing incident response personnel for incidents,
developing a plan to contain incidents such as DDOS attacks, and how to recover
from attacks. Companies with level two and higher CMMC requirements will need to
monitor their systems for signs of an attack, this includes DDOS attacks. This
generally involves leveraging an intrusion detection system. If you would like
more information on CMMC related requirements feel free to reach out to us at
info@lakeridge.us.
 

Quick & Simple


DISCOVER OUR CYBERSECURITY COMPLIANCE SOLUTIONS:

Whether you need to meet and maintain your compliance requirements, help your
clients meet them, or verify supplier compliance we have the expertise and
solution for you


NIST SP 800-171 & CMMC COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
NIST SP 800-171 and CMMC requirements.
Learn More


HIPAA COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
HIPAA security rule requirements.
Learn More


FAR 52.204-21 COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
requirements.
Learn More


ISO 27001 COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
ISO 27001 requirements.
Learn More
 



CYBERSECURITY COMPLIANCE
QUICK. SIMPLE. AFFORDABLE.
GET STARTED TODAY

Book a Discovery Call
 * 
 * 
 * 
 * 

PRODUCT

 * Login
 * Register
 * Forgotten password
 * NIST SP 800-171 & CMMC Compliance
 * HIPAA Compliance
 * FAR 52.204-21 Compliance
 * ISO 27001 Compliance

COMPANY

 * About us
 * Join our team
 * Affiliate Program
 * Contact us

RESOURCES

 * Our blog
 * HIPAA Handbook
 * NIST SP 800-171 & CMMC 2.0 Handbook
 * CMMC 1.0 Handbook

LEGALS

 * Privacy policy
 * Terms & conditions
 * Security
 * Sitemap

All rights reserved © Lake Ridge Technologies 2024