What are stressers?
Stressers are semi-legal IT services, which for a fee, enable their clients to mobilise DDoS attacks. These can be legitimate when used to conduct legal and consensual penetration tests of computer systems to improve security. Improved security that could, for example, help companies and governmental organisations keep their websites afloat during heavy internet traffic. This is where a stresser can assist in developing resilience, so long as consent is given by the site owner. While stressers were created as testing tools, most are used to facilitate more malicious attacks. This potential semi-legitimate usage of stressers raises several important questions, for example, are they legally justifiable or are they just a hidden and dangerous form of crime-ware-as-a-service? Furthermore, to what extent does their organisational form illustrate new forms of organised crime online?
Stressers negotiate a peculiar position in a grey space, as both legitimate and illegitimate online service tools. For this research we analysed a data set taken from StressSquadZ (a pseudonym), a now defunct stresser (see Fig. 2) to see if it shares characteristics with offline criminal (and also terror) organisations, or even some well-known legitimate online service providers. In conducting this analysis, we also draw upon other recent cases and investigations such as Lizard Squad, Mirai malware. Using the data gathered from the StressSquadZ forum and analysing the activity of its members over a period of six months—from its opening to its takedown—we looked at the service provided, the users (clients) and also their transactions. We found that most DDoS attacks had very low impacts in terms of damage caused and they also generated surprisingly small revenues, but this was set against almost non-existent risks in terms of being caught and a relatively small transaction window overall. The outcomes were also more complicated than expected because some uses had more serious consequences, which increased, the longer the services ran.
Stressers, as stated earlier, are largely used for illegal DDoS attacks. These are not only tolerated by stresser organisers, but also rarely prevented to the point that the lack of prevention is tantamount to an encouragement of abuse of service. For example, John Kelsey Gammell, an electronic technician from New Mexico, admitted to buying subscriptions for DDoS-for-hire services to launch attacks against businesses that had either fired or declined to rehire him. He also tried to recruit people with similar interests on social media to launch his own DDoS-for-hire service business (Claburn 2018). Business organisations and government agencies are usually the main targets of DDoS attacks, but the likes of gaming websites, for example, are also regularly affected as well by those seeking revenge for losses or financial gain by trying to interrupt the operating algorithms.
Many individuals, with an interest in IT, trial these attacks from a very young age and most are under the age of 20 (Hall 2016; NCA 2017). They pay for stressers to maliciously deploy software to launch DDoS attacks and they are often seemingly unaware of the broader consequences of their actions (Claburn 2018). See, for example, the case of Adam Mudd who created a malware called Titanium Stresser when he was only 15 years old and sold it online, He also used it to launch attacks upon websites, gamers and colleges. He allegedly profited from the malware by almost $400,000 and the Titanium Stresser was one that the Lizard Squad developed further for its own ends (Corfield 2017).
Once a stresser group forms, it is relatively easy for users to carry out successful attacks against bigger targets. This was the case with Lizard Squad which attacked Sony PlayStation, Xbox Live, Tor Network and Blizzards Warcraft (Amir 2018). The organisation of this group was extremely ephemeral in terms of its composition and activities, making it more difficult for law enforcement agencies not only to track down the individuals involved, but also to correctly prosecute them for their illicit actions. In fact, once such a group disappears following completion of a criminal activity, some of its surviving members will simply reform with others to create a new group, using their knowledge, and frustrating policing efforts. After multiple arrests of alleged members from online gangs, it appears that some continue to operate under a different name. For example, some of Lizard Squad appear to have reformed as BigBotPein, which released the Mirai malware and its variants in 2016 (Amir 2018). This is the same botnet used in August 2017 to attack and blackmail Lloyds Banking Group and Barclay’s banks, infecting 1.25 million Deutsche Telekom routers (Schwartz 2017).
Because most stresser users seek a criminal goal, the providers are by default classed as an online organised crime group, especially as DDoS attacks are usually performed without the (victim) website owner’s knowledge. Even though, the use of the site (facility) may often be justified on the grounds that it can be used for legitimate stresser testing (FBI 2017). Stressers create a cost to society (as mentioned earlier) by preventing access to businesses and disrupting their operations, with the effect of damaging their reputation in the market-place and reducing business and profit. They also create major challenges for law enforcement. In most jurisdictions, laws exist to provide police and criminal justice systems with the powers to arrest, prosecute and imprison DDoS attackers, plus seize their computers and other electronic devices used as well as the proceeds of their crimes, which are also included within the investigative powers for cases of suspected terrorism or organised crime. The US Computer Fraud and Abuse Act (Sect. 18 U.S. Code 1030), for example and the UK Computer Misuse Act (1990 c.18) are legislative measures in two of many jurisdictions. But the laws focus upon the DDoS attackers, rather than those who actually facilitate the attacks—the brokers who operate the stressers (Porcedda and Wall 2019: 8). While DDoS attacks are hard to intercept quickly by law enforcers, it may, however, be possible to increase law enforcement powers to disrupt stressers when they are being used for criminal purposes and the link/ conspiracy between the stresser and attacker can be shown. Alternatively, introducing statutory regulations making providers ensure that they ‘know their customers’, or making sure that only approved payment systems are being used. Plus, also increasing the crime prevention mission by advising companies and governments to protect themselves by increasing their network bandwidth, multiplying their website providers, filtering out traffic, performing stress-tests, looking for spikes in traffic or avoiding using cryptocurrencies or PayPal when paying for a stresser. These measures could not only increase the security of targets but also potentially reduce the amount of damages and compensation paid by the company when the attack has not been prevented (Porter 2017). Also underlying these measures is a need to understand the nature of the stresser as crimeware-as-a-service and, to this end, we analyse a case study.
The StressSquadZ case study
We acquired anonymised forum data and website details from a stresser that had been taken down by law enforcement and shared with us by cybersecurity company DutchSec. Ethics approval was obtained during the realisation of the TAKEDOWN project.Footnote 6 The data we received had been already anonymised in order to prevent the actual identification of any user, plus, prior to this anonymisation, it must be pointed out that most of the original user IDs would have been proxies to preserve the users’ initial identity (see Lusthaus 2018). Therefore, it would have not been possible for us to trace back users’ actual identity as all identification details were either omitted, obscured or changed. The StressSquadZ website appeared to have been registered in multiple locations around the world under the name of the same owner.
We sought to understand how the stresser group was organised and used a social network analysis approach to explore the various types of service provided, the users and their transactions. Social network analysis is the most successful method for highlighting such group dynamics (Sparrow 1988) and is best suited to understand intra-group differences (Wolfer et al. 2015)—as in our case study. This methodology allowed us to analyse over 1400 users and visually outline their behavioural patterns. It is consistent with literature analysing large cohorts of people and offenders, and it allowed us to lay out similarities and differences in choices and interactions (Berlusconi 2013 and Carrington 2011). Moreover, it has already been used in the past for analysing online offenders (Holt et al. 2012).
In StressSquadZ, every user had a unique ID to access the website and forum. The same ID was used to carry out transactions. Therefore, when a user repeated a transaction the same ID would show up. We built a list of users transactions, outlining what they would buy, when and how many times. Each entry on the data would display a unique (anonymised) ID; the type of plan purchased; time and date of purchase. We built a separate list for the website forum where users would discuss their experiences of the stresser service. This second list contained more qualitative data as each entry would have an alphanumeric entry for the original poster in the forum; the title of the thread; the number of attacks carried by the original poster; the time and date of first thread; the thread moderator status for the original poster and the forum thread. It was not possible to integrate the two lists because the anonymised IDs were also randomised by the data supplier.Footnote 7 This is a limitation because the second list contained information that could have offered a better profile of the organisation, users and transactions, such as the number of attacks launched by each user. By comparing the two lists, however, it was still possible to infer that there were active and experienced users in the forum and that there were some users who spent considerable sums of money for the service, but it was not possible to pinpoint exactly who they were. One other limitation in this approach is that we had to assume that each ID is a different user, when some may also have had multiple profiles.
The list and data were processed with R software and igraph package. The graph chosen to represent the network employs a Fruchterman-Reingold algorithm (1991) as it allowed us to place similar nodesFootnote 8 closer to each other and distance different groups of users. In the graph from Fig. 2 peripheral nodes are the users. Each user is linked to a purchased plan, that, in the graph, is in a central position, as multiple users purchased the same service. We focused upon the payment plans and their take-up as it reveals much about the stresser’s business model and operations (see Fig. 2 below).
Figure 2 is a visual representation of StressSquadZ in terms of its clientele and their payment plans. The offenders who hired the stresser were classified into three groups according to how much they paid for their services. The three categories of hacker grouping, the amateurs (wannabees and lamers), the skilled non-professionals (Hobbyists) and the Professionals, strongly align with groupings adapted from the 2006 Hacker Profiling Project (Chiesa et al. 2006; Porcedda and Wall 2019). They illustrate differential levels of usage in-line with different levels of skills and financial resources. It was assumed that the amateurs would be interested in the service if it was affordable, but not prepared to pay much for it as their intentions were driven more by curiosity. The skilled non-professionals would be prepared to pay more to achieve their aims, but not too much as they were not going to recover their costs. The professionals, by comparison, would be prepared to pay the most as they had high expectations of service and would expect a return on their investment.
StressSquadZ offered its clients various levels of service at different prices that ranged from the $1.99 trial to the $249.99 VIP (lifetime full power) service. A total of 359 payments were recorded and clustered according to the amount an individual paid. Each transaction was attached to a specific delivery plan, of which there were a total of 16. They started with trial plans and ended with premium VIP services. The payments and subscription plans were found to be clustered around users and directed towards their chosen payment and subscription. Therefore, the users who picked the trial $1.99 plan (plan 1 in Table 1) were the majority – they paid 183 times. These are the red coloured links in the graph in Fig. 2. After the trial plans, the next popular category were the monthly subscriptions. Some users moved through different plans, say, from first choosing a trial plan to taking out a subscription plan. Seventy-three users upgraded their subscription from trial plans to monthly or even yearly or lifetime subscriptions. This is why it is possible to see multiple links emerging from users in Fig. 2. They are differently coloured according to the plan chosen and level of expertise.
Table 1 Plans, subscriptions and offender groupings The cheap trial plans did not allow users to perform full-power attacks and were limited in time, for example, they could do little more than temporarily reduce a fellow gamer’s computer speed. That is the reason why we see in Fig. 2 some users who are tied to more than one plan. When their plans were checked with the timing of the payments it was possible to notice an evolutionary pattern from the trial service to lifetime subscriptions, suggesting a pathway into higher cost and more impactful plans. We also found that specific users displayed different consumer behaviour patterns. One user, for example, bought 5 trial plans, possibly because they were enough for his or her needs, rather than pay more for a more powerful service. In pure marketing terms, this technique attracts more people at a price set under or close to the actual cost of running the tool. They are effectively loss leaders which encourage subscribers to switch to a more expensive service. The majority of subscribers first bought a trial plan before buying a higher cost plan. Only 53 of the trial users did not upgrade to different plans. Please note that we consider that those who bought a trial plan either did not know how to use a stresser and tested it with the least economic effort possible, or they knew already how to use stressers, but did not know much about the StressSquadZ service. Yet, some of them clearly knew already how to use the service and managed to get a satisfactory result which encouraged them to upgrade to more a powerful subscription. We interpret this result from the number of attacks launched by these users and the fact that after the trial, they bought the plan more than once.
Some clients, in contrast, never upgraded because the service did not suit their needs, or they did not possess the skills to run an attack (e.g. the amateurs). Hence this is why not every user in the red area is not also linked to other plans. Furthermore, there were also users who knew how to run stressers very well and needed a powerful service that was strong enough to take down larger complex websites. These users paid the highest prices for the higher-grade services and in some cases, received a bespoke service. In Fig. 2, these are coloured in yellow (skilled non-professionals) and green (for professionals, the top-level users). This finding was obtained by comparing the quantitative data with the qualitative data from the forum analysis. More experienced users sought to buy a tailored service with features that beginners did not have access to. Another observation was that not all the users in the discussion forum made purchases or subscribed to plans and there was a relatively low level of engagement. Only 285 users (out of 1451) were subscribers to trials or other plans. This observation was also reflected in the wider crime forum literature (see, for example, Karami et al. 2016). We interpret this finding in terms of the interest being generated about the service as only the buyers focus upon their engagement and activity. Users joined the club because they heard about it in other forums or from other users and they were curious about its capabilities. This was apparent from the forum threads, which in this case study were structured in a help-desk format, in which the most active members posted at least four threads.
Profits
When we explored how much profit the stresser generated, we found a figure of $4067.28 per month at its peak. This is actually a low profit margin compared to that generated by other stresser groups – but probably still a lot of money to a young person. The VSO stresser, for example, is reported to have made $24,737 profit per month and Lizard stresser around $6,000 per month (Karami et al. 2016). The income of StressSquadZ may, however, have been smaller than the others because of its relatively short operating period and take up. Figure 3 shows that many users bought a plan at the launch of the service, but take-up slowed down before then stopping almost completely in November when only 5 members renewed their subscription with no new users joining. Could this have been because other stresser services were taking away the business? In December and January new subscription and renewals began again at a steady pace. It is also possible to see that, with the exception of a few cases, renewals took place a short time after the initial purchase (this is noticeable in Fig. 3 by looking at the dots that fall under the line).
Once we matched this finding with the price paid by users over time (see Fig. 4), it was found that higher prices were paid straight away at the first purchase, suggesting that this group (e.g. skilled non-professionals and professionals) were composed of experienced users, who already possessed a set of skills necessary to use the tools. Analysis of the prices paid indicate the existence of at least two groups, the amateurs (or wannabees) and the skilled non-professionals. The early birds and users who bought the service after November spent the most money, while between those two sets were few renewals and many trial subscriptions.
User activities
An analysis of member’s activity and their payment patterns shows that not everyone who subscribed to StressSquadZ could have had an active interest in performing a DDoS attack. Alternatively, they may not have wanted to pay to carry one out or they may have simply been curious? In the forum thread, only 127 of the 1451 (9%) members actively appear to have carried out an attack.
Organisation and customer support
Furthermore, it seems that whilst there was only one owner of the forum and two members with administrative powers, another sixteen members were very active in replying to forum threads and launching attacks, thus, playing a central role in delivering the stresser. There was also a customer service section that helped clients with their queries but also protected and maintained the stresser. Table 2 shows the list of the users who opened more threads in the forum. It was not possible to match the payment data of some users with their forum threads, but the forum data did provide some useful information on tracking down members who posted payment details on threads – it is not shown here, as it could possibly reveal the identity of the people involved with such activities (although most identifiers were themselves proxies).
Table 2 Most active users in the ticket forum (N.B. Names are pseudonyms)