A Georgia man has admitted in court to employing a third-party to launch a distributed denial of service (DDoS) attack.
The man, Tucker Preston, 22, of Macon, Georgia, was charged with one count of damaging protected computers by transmission of a program, code or command.
Preston is the co-founder of BackConnect Security LLC, a company that provides protection against large-scale DDoS attacks.
He pled guilty to engaging with a DDoS-for-hire service to target a company that maintained servers in New Jersey, the United States Department of Justice announced.
During a DDoS attack, a large volume of web traffic is directed toward a victim’s resources, such as a server or another computer system, to either slow it down or completely take it offline.
According to court documents, in or around December 2015, Preston asked the DDoS-for-hire service to initiate attacks against the victim company, which disrupted the company’s business and caused damage.
Preston pled guilty to one count punishable by a maximum penalty of 10 years in prison and a fine of up to $250,000. He is scheduled for sentencing on May 7, 2020.
While the victim company isn’t named in court documents, security journalist Brian Krebs suggests that it could be the Free Software Foundation.
The non-profit apparently considered working with BackConnect, but started experiencing DDoS attacks after informing the company that it would contract a different entity for DDoS protection.
Related: How to Stop a DDoS Attack Without Sabotaging Your Own Network
Related: Man Behind DDoS Attacks on Gaming Companies Pleads Guilty
Related: FBI Takes Down Site Selling Subscriptions to Stolen Data

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
