Privacy Overview

This website uses cookies to improve your experience while you navigate through the website.

Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website.

We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Odds
Home » Blog » DDOS Attack Extortionists Targeting Online Gambling Sites in Recent Weeks

DDOS Attack Extortionists Targeting Online Gambling Sites in Recent Weeks

April 16, 2015

The never-ending battle between online commerce accessibility and extortion attempts by organized-crime elements has returned to the general sphere of online gambling in recent weeks.  It’s an old, old problem, almost as old as the Internet itself, and every year or two public knowledge of a new wave of attacks against gambling-related sites emerges.

unibet_logo
Unibet is one of several major online companies reported to be a recent target of extortionate DDOS attacks.

Several recent feature stories and corporate postings indicate that yet another wave of such DDOS (Distributed Denial of Service) attacks has been occurring, seeking to block customer traffic to online websites until the sites pay the extortionists’ demands to stop the attacks.

Among the sites and networks known or alleged to have suffered such attacks in recent weeks are Unibet, Betfair, PokerStars (which now offers far more than just poker across its European market), Winamax, TonyBet, and even a small Malta-based operation called Betat that operates a handful of tiny, very-grey-market sites targeting largely US-based players.  (Given that Betat is a long-term spamming operation that has recently begun sending cell-phone text spam to its own set of victims, it’s hard to get too worked about that one, but they’re on the list nonetheless.  In this author’s opinion, spamming is itself its own form of theft.)

Traditionally, sports betting sites have been targeted by such extortionists in the days and weeks prior to major sporting events, such as the FIFA World Cup or American football’s Super Bowl.  The modus operandi behind the extortionists has always been the threat of denying service to these companies’ online portals during their peak periods.  A typical DDOS extortion attack typically employs networks of thousands of corrupted computers, all infected by viruses without their owners’ knowledge, being manipulated by the attackers to send repeated bursts of online traffic to the targeted sites.

Since even the largest online sites have limits as to how much bandwidth they have available at any given moment, such attacks — and the targeted sites’ responses to them — have long been an ever-escalating cat-‘n-mouse game, in which the sites and their Internet services employ ever-stronger methods to block the bogus traffic, while the attackers themselves add more and more weapons and ways of generating bogus traffic to clog the sites.

One of the sad parts of online commerce’s history is that quite often, the companies being targeted have paid the blackmail.  Paying blackmailers is of course, in no one’s best long-term interest; it’s a prime example of a theory called “the tragedy of the commons.”

The blackmailers themselves have, traditionally, originated from Eastern European countries, often with the tacit approval of local government officials.  Such rings have been busted in the past in Russia (more than once), Poland and the Ukraine, but the cost of living in the these countries’ major metropolitan centers often exceeds what computer programmers are often paid, leaving wide swaths of technically-skilled Internet coders with incentive to earn income in less-legal ways.

Sports betting sites aren’t also the only entities targeted.  Online-poker sites are even more frequently targeted, as are major MMP gaming sites.  Because of the high interactivity and dedicated connection to host servers that these gaming forms require, they’re even more susceptible in some ways than sports betting operations.

Other commerce channels are often targeted as well, particular those that have been shown to be profitable in generating large amounts of small- to medium-sized payments and transactions.

One of the latest twists, according to the reports recently published, is an increasing insistence by the extortionists to be paid via Bitcoin or similar largely-anonymous virtual currencies.  According to a CalvinAyre.com, tiny Betat paid 10 Bitcoin (about US $2,200) to the extortionists to stop the attack.

There’s little indication that the attacks will stop any time soon.  The various Eastern European governments have generally shown little interest in getting involved in cases and crimes that don’t involve their own country’s commerce, and the criminals have, for the most part, steered clear of major Eastern European sites.  Non-governmental groups such as Anonymous have occasionally shown interest in pursuing the criminal groups, though little has come of those efforts as well.

Much like shoplifting, DDOS attacks are a crime which eventually costs all of us money.  The blackmail paid to the criminals eventually gets added in some form to the fees charged to legitimate customers on other bets.  Some day perhaps, major governments will unite to find a way to put these criminals out of business for good.

But as the recent headlines attest, we’re not there yet.

About the author

Eric Roberts
Eric Roberts

Sports Journalist

Eric has been a sports journalist for over 20 years and has travelled the world covering top sporting events for a number of publications. He also has a passion for betting and uses his in-depth knowledge of the sports world to pinpoint outstanding odds and value betting opportunities.