Most individuals who function DDoS-for-hire companies try to cover their true identities and site. Proprietors of those so-called “booter” or “stresser” providers — designed to knock web sites and customers offline — have lengthy operated in a legally murky space of cybercrime regulation. However till not too long ago, their largest concern wasn’t avoiding seize or shutdown by the feds: It was minimizing harassment from sad prospects or victims, and insulating themselves in opposition to incessant assaults from competing DDoS-for-hire providers.
After which there are booter retailer operators like John Dobbs, a 32-year-old laptop science graduate scholar residing in Honolulu, Hawaii. For at the least a decade till late final 12 months, Dobbs overtly operated IPStresser[.]com, a well-liked and highly effective attack-for-hire service that he registered with the state of Hawaii utilizing his actual identify and deal with. Likewise, the area was registered in Dobbs’s identify and hometown in Pennsylvania.
Dobbs, in an undated picture from his Github profile. Picture: john-dobbs.github.io
The one work expertise Dobbs listed on his resume was as a contract developer from 2013 to the current day. Dobbs’s resume doesn’t identify his booter service, however in it he brags about sustaining web sites with half 1,000,000 web page views every day, and “designing server deployments for efficiency, high-availability and safety.”
In December 2022, the U.S. Division of Justice seized Dobbs’s IPStresser web site and charged him with one rely of aiding and abetting laptop intrusions. Prosecutors say his service attracted greater than two million registered customers, and was liable for launching a staggering 30 million distinct DDoS assaults.
The federal government seized four-dozen booter domains, and criminally charged Dobbs and 5 different U.S. males for allegedly working stresser providers. This was the Justice Division’s second such mass takedown concentrating on DDoS-for-hire providers and their accused operators. In 2018, the feds seized 15 stresser websites, and levied cybercrime expenses in opposition to three males for his or her operation of booter providers.

Dobbs’s booter service, IPStresser, in June 2020. Picture: archive.org.
Many accused stresser website operators have pleaded responsible over time after being hit with federal legal expenses. However the authorities’s core declare — that working a booter website is a violation of U.S. laptop crime legal guidelines — wasn’t correctly examined within the courts till September 2021.
That was when a jury handed down a responsible verdict in opposition to Matthew Gatrel, a then 32-year-old St. Charles, Sick. man charged within the authorities’s first 2018 mass booter bust-up. Regardless of admitting to FBI brokers that he ran two booter providers (and turning over loads of incriminating proof within the course of), Gatrel opted to take his case to trial, defended your entire time by court-appointed attorneys.
Prosecutors mentioned Gatrel’s booter providers — downthem[.]org and ampnode[.]com — helped some 2,000 paying prospects launch debilitating digital assaults on greater than 20,000 targets, together with many authorities, banking, college and gaming web sites.
Gatrel was convicted on all three expenses of violating the Laptop Fraud and Abuse Act, together with conspiracy to commit unauthorized impairment of a protected laptop, conspiracy to commit wire fraud, and unauthorized impairment of a protected laptop. He was sentenced to 2 years in jail.
Now, it seems Dobbs can be planning to take his probabilities with a jury. On Jan. 4, Dobbs entered a plea of not responsible. Neither Dobbs nor his court-appointed legal professional responded to requests for remark.
However because it occurs, Dobbs himself supplied some perspective on his considering in an electronic mail change with KrebsOnSecurity again in 2020. I’d reached out to Dobbs as a result of it was apparent he didn’t thoughts if individuals knew he operated one of many world’s hottest DDoS-for-hire websites, and I used to be genuinely curious why he was so unafraid of getting raided by the feds.
“Sure, I’m the proprietor of the area you listed, nevertheless you aren’t approved to put up an article containing mentioned area identify, my identify or this electronic mail deal with with out my prior written permission,” Dobbs replied to my preliminary outreach on March 10, 2020 utilizing his electronic mail deal with from the College of Hawaii at Manoa.
Just a few hours later, I acquired extra strident directions from Dobbs, this time by way of his official electronic mail deal with at ipstresser[.]com.
“I’ll state once more for absolute readability, you aren’t approved to put up an article containing ipstresser.com, my identify, my GitHub profile and/or my hawaii.edu electronic mail deal with,” Dobbs wrote, as if taking dictation from a lawyer who doesn’t perceive how the media works.
When pressed for particulars on his enterprise, Dobbs replied that the variety of IPStresser prospects was “privileged info,” and mentioned he didn’t even promote the service. When requested whether or not he was involved that lots of his rivals had been by then serving jail time for working comparable booter providers, Dobbs maintained that the way in which he’d arrange the enterprise insulated him from any legal responsibility.
“I’ve been conscious of the current regulation enforcement actions in opposition to different operators of stress testing providers,” Dobbs defined. “I can not communicate to the actions of those different providers, however we take proactive measures to forestall misuse of our service and we work with regulation enforcement companies concerning any reported abuse of our service.”
What had been these proactive measures? In a 2015 interview with ZDNet France, Dobbs asserted that he was immune from legal responsibility as a result of his purchasers all needed to submit a digital signature testifying that they wouldn’t use the location for unlawful functions.
“Our phrases of use are a authorized doc that protects us, amongst different issues, from sure authorized penalties,” Dobbs instructed ZDNet. “Most different websites are happy with a easy checkbox, however we ask for a digital signature with the intention to indicate actual consent from our prospects.”
Dobbs instructed KrebsOnSecurity his service didn’t generate a lot of a revenue, however quite that he was motivated by “filling a professional want.”
“My cause for providing the service is to supply the flexibility to check community safety measures earlier than somebody with malicious intent assaults mentioned community and causes downtime,” he mentioned. “Positive, some individuals see solely the negatives, however there’s a lengthy checklist of corporations I’ve labored with over time who would say my service is a godsend and has helped them forestall tens of 1000’s of {dollars} in downtime ensuing from a malicious assault.”
“I don’t consider that offering such a service is illegitimate, assuming correct due diligence to forestall malicious use of the service, as is the case for IPstresser[.]com,” Dobbs continued. “Somebody utilizing such a service to conduct unauthorized testing is illegitimate in lots of international locations, nevertheless, the authorized legal responsibility is that of the consumer, not of the service supplier.”
Dobbs’s profile on GitHub consists of extra of his concepts about his work, together with a curious piece on “software program engineering ethics.” In his January 2020 treatise “My Software program Engineering Journey,” Dobbs laments that nothing in his formal training ready him for the fact that a substantial amount of his work could be so tedious and repetitive (this tracks intently with a 2020 piece right here known as Profession Alternative Tip: Cybercrime is Principally Boring).
“One space of software program engineering that I believe must be coated extra in college courses is upkeep,” Dobbs wrote. “Tasks are sometimes labored on for at most a number of months, and college students don’t expertise the upkeep side of software program engineering till they attain the office. Let’s face it, ongoing upkeep of a undertaking is boring; there’s nothing just like the euphoria of finishing a undertaking you may have been engaged on for months and releasing it to the world, however I might say that half of my skilled profession has been associated to upkeep.”
Allison Nixon is chief analysis officer on the New York-based cybersecurity agency Unit 221B. Nixon is a part of a small group of researchers who’ve been intently monitoring the DDoS-for-hire trade for years, and he or she mentioned Dobbs’s declare that what he’s doing is authorized is smart provided that it took years for the federal government to acknowledge the dimensions of the issue.
“These guys are arguing that their providers are authorized as a result of for a very long time nothing occurred to them,” Nixon mentioned. “It’s troublesome to argue one thing is illegitimate if nobody has ever been arrested for it earlier than.”
Nixon says the federal government’s battle in opposition to the booter providers — and by extension different varieties of cybercrimes — is hampered by a authorized system that always takes years to cycle via cybercrime circumstances.
“With cybercrime, the cycle between the crime and investigation and arrest can usually take a 12 months or extra, and that’s for a extremely quick case,” Nixon mentioned. “If somebody robbed a retailer, we’d anticipate a police response inside a couple of minutes. If somebody robs a financial institution’s web site, there is perhaps some indication of police exercise inside a 12 months.”
Nixon praised the 2022 and 2018 booter takedown operations as “enormous steps ahead,” however added that “there have to be extra of them, and quicker.”
“This time lag is a part of the explanation it’s so troublesome to close down the pipeline of latest expertise going into cybercrime,” she mentioned. “They assume what they’re doing is authorized as a result of nothing has occurred, and due to the period of time it takes to close these items down. And it’s actually a giant drawback, the place we see lots of people changing into criminals on the premise that what they’re doing isn’t actually unlawful as a result of the cops gained’t do something.”
In December 2020, Dobbs filed an software with the state of Hawaii to withdraw IP Stresser Inc. from its roster of lively corporations. However in line with prosecutors, Dobbs would proceed to function his DDoS-for-hire website till at the least November 2022.
Two months after our 2020 electronic mail interview, Dobbs would earn his second bachelor’s diploma (in laptop science; his resume says he earned a bachelor’s in civil engineering from Drexel College in 2013). The federal expenses in opposition to Dobbs got here simply as he was making ready to enter his closing semester towards a grasp’s diploma in laptop science on the College of Hawaii.
Nixon says she has a message for anybody concerned in working a DDoS-for-hire service.
“Except you’re verifying that the goal owns the infrastructure you’re concentrating on, there is no such thing as a authorized solution to function a DDoS-for-hire service,” she mentioned. “There is no such thing as a Phrases of Service you can placed on the location that might in some way make it authorized.”
And her message to the purchasers of these booter providers? It’s a compelling one to ponder, notably now that investigators in the USA, U.Okay. and elsewhere have began going after booter service prospects.
“When a booter service claims they don’t share logs, they’re mendacity as a result of logs are authorized leverage for when the booter service operator will get arrested,” Nixon mentioned. “And after they do, you’re going to be the primary individuals they throw below the bus.”