Security Experts:

Connect with us

Hi, what are you looking for?



DoJ Looking for Victims of ‘Quantum Stresser’ DDoS Service

The U.S. Department of Justice has asked victims of the Quantum Stresser DDoS-for-hire service, whose operator was recently sentenced, to come forward.

The U.S. Department of Justice has asked victims of the Quantum Stresser DDoS-for-hire service, whose operator was recently sentenced, to come forward.

Quantum Stresser was run by 24-year-old David Bukoski of Hanover Township, Pennsylvania. According to authorities, the service had roughly 70-80,000 subscribers between 2011 and 2018, and in 2018 customers launched or attempted to launch approximately 50,000 DDoS attacks aimed at individuals or organizations.

Bukoski was indicted in 2018 and in August 2019 he pleaded guilty to aiding and abetting computer intrusions. He was sentenced on February 4 to five years probation and six months of community confinement — the light sentence is mostly due to his poor health.

Law enforcement agencies in Alaska conducted the investigation into Quantum Stresser and prosecuted Bukoski, and the U.S. Attorney’s Office for the District of Alaska has now asked victims to come forward before a restitution hearing is held on May 5.

In a restitution hearing the court determines if the offender owes restitution and, if so, how much they owe.

“Due to the large number of potential victims in this case, Chief U.S. District Judge Timothy M. Burgess issued an order directing the government to employ alternative victim notification procedures so that any member of the community at large who believes they may be a crime victim is made aware of their potential rights,” reads a press release published this week by the US Attorney’s Office in Alaska.

“The government is asking that members of the community who believe they may be a victim of Bukoski’s criminal activities, to please contact (907) 271-3041 to reach the Victim-Witness Unit at the U.S. Attorney’s Office, District of Alaska,” it continues.

Security blogger Brian Krebs pointed out that investigators identified Bukoski after he used an email address involved in his illegal activities to order a pizza to his home.

Related: Hacktivist Gets 10-Year Prison Sentence for DDoS Attack on Hospitals

Related: DDoS-for-Hire Service Admin Gets 13 Months in Prison

Related: U.K. Teen Responsible for Bomb Threats, DDoS Attacks Sentenced to Prison

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.