Skip to main content

Arrest made over Spamhaus DDoS attack

A 35-year-old Dutchman was arrested in Spain last week under suspicion that he played a role in March's distributed denial-of-service (DDoS) attack on Spamhaus.

Identified by the Dutch Public Prosecutor Service by only the initials S.K., the man was arrested in Barcelona.

According Ars Technica, which cited "a variety of circumstantial evidence," the suspect is Sven Olaf Kamphuis, who was quoted last month in the New York Times as saying that Dutch hosting company CyberBunker, with which he is affiliated, was behind the attack. He later denied his association.

There is no official word as to whether the man in custody is Kamphuis. He is expected to be transferred to the Netherlands soon, according to the Dutch Public Prosecution Service.

Last month's DDoS attack on The Spamhaus Project, which tracks the Internet's spam operations and maintains real-time databases that help weed out bogus emails, knocked out its website and mail systems over the course of several days.

The attack, carried out by Web hosting provider CyberBunker as payback for getting blacklisted by Spamhaus, reached 300 Gbps — a normal DDoS attack that could take down a bank website is around 50 Gbps.

Meanwhile, DDoS protection services firm Prolexic on Thursday released a video documenting how it moderated a 160 Gbps, 120 million packet-per-second (pps) attack, which occurred earlier this month. The three-minute video shows the different points in the cloud-based infrastructure where Prolexic blocked malicious DDoS attack traffic.

"There's a lot of scaremongering at the moment and hyping of attack sizes," Prolexic CEO Scott Hammack said in a statement. "Even though attack sizes are getting extremely large, as documented in this video [...] Prolexic is able to mitigate them effectively."

Check out the video below.

Earlier in the week week, a member of LulzSec was arrested by the Australian Federal Police (AFP) for attacking various corporate and government websites as part of the hacking collective.