#DropKiwiFarms

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Status
Not open for further replies.
Posting more Violn funnies since I'm incredibly bored.


View attachment 4069155
View attachment 4069161
Haha. Very funny. The fact that you barely understand what is going on around the dang dirty KiwiFarms makes you a retard like the other seething trannies that are still stalking at this site. Nobody gives a shit about that event anyways. You're seething and dilating like a crybaby, which is laughable.
You can't even get what the definition of dying is :story: . No1curr about it. You barely learn shit. Keffals will forever be a male, and so are you.
 
Doesn't reddit have the same shit? Communities dedicated around watching people die?
Reddit also has entire communities dedicated to make fun of boomers dead from the coof, but that's acceptable because boomers are evil right?
Reddit has entire communities dedicated to bestiality and pedo shit, but that's okay?
Twitter brain.
You can find entire threads with videos of people dying on 4chan anyways. And they have cloudflare protection.
 
Doesn't reddit have the same shit? Communities dedicated around watching people die?
Reddit also has entire communities dedicated to make fun of boomers dead from the coof, but that's acceptable because boomers are evil right?
Reddit has entire communities dedicated to bestiality and pedo shit, but that's okay?

Yes, Reddit had r/watchpeopledie, which was eventually banned in 2019 after the Christchurch shooting. It had close to half a million subs.

Reddit also has/had subs dedicated to trading sexual images and revenge porn of women (mostly Asian females) and trying to dox them, which were all still running as recently as August 2022:

Addresses, social media accounts, phone numbers and more were pieced together by Reddit users. Threats, blackmail, and related comments would soon be sent to their chosen targets.​
In fact, this isn’t the work of “just” one subreddit but dozens. One subreddit played host to around 20,000 users and contained more than 15,000 images. And 150 of those were sexually explicit. It seems at least some of these images are being shared by ex-partners without consent. Others victims have been filmed or photographed secretly, and then had the images posted online at a later date.​

But Reddit disallows the truly bad stuff (disagreeing with men in dresses) so that site is Good, and this site doesn't so it is Bad.
 
I've got a love hate relationship with the place where that happened, and FWIW I do have a problem with that video. But you can't tar an entire community with the same brush like that. This is a broad church, even broader than the autistic spectrum.
 
Day 106 of #DropKiwiFarms and the Farms are up and running fast and clean with open registration. It really must be said that Keffals is an abject failure.
 
Posting more Violn funnies since I'm incredibly bored.


View attachment 4069155
View attachment 4069161
View attachment 4069167

1671057459703.png


1671057802098.png
 
This may be of interest, not sure which of the DropKiwiFarms-adjacent threads this belongs in:

US Is Seizing 48 Websites in Sting of Cyberattack-for-Hire Services​

  • Domains sold the ability to knock victims offline, US says
  • Six people charged by DOJ in connection with running the sites
 
In each of these criminal cases, the FBI posed as a customer and conducted test attacks to confirm that the booter site functioned as advertised.
How interesting that the DDoS bust was a sting operation, let's hope the discovery is more than a giant [redacted]. While it's probably unlikely KF was involved at all, have there been other high profile targets lately? My Internet knowledge is pretty boomer-tier so I'm pretending it was all the glowies fault for the last round of attacks.

Also from article:
“Whether a criminal launches an attack independently or pays a skilled contractor to carry one out, the FBI will work with victims and use the considerable tools at our disposal to identify the person or group responsible. Victims of cybercrime are urged to contact their local FBI field office or file a complaint with the FBI’s Internet Crime Complaint Center at ic3.gov."
LMAO I'm sure LE will get right on prosecuting the troons for their cyber-terrorism!!!
 
More in-depth coverage:
Six Charged in Mass Takedown of DDoS-for-Hire Sites
December 14, 20229 Comments
The U.S. Department of Justice (DOJ) today seized four-dozen domains that sold “booter” or “stresser” services — businesses that make it easy and cheap for even non-technical users to launch powerful Distributed Denial of Service (DDoS) attacks designed knock targets offline. The DOJ also charged six U.S. men with computer crimes related to their alleged ownership of the popular DDoS-for-hire services.


The booter service OrphicSecurityTeam[.]com was one of the 48 DDoS-for-hire domains seized by the Justice Department this week.

The DOJ said the 48 domains it seized helped paying customers launch millions of digital sieges capable of knocking Web sites and even entire network providers offline.

Booter services are advertised through a variety of methods, including Dark Web forums, chat platforms and even youtube.com. They accept payment via PayPal, Google Wallet, and/or cryptocurrencies, and subscriptions can range in price from just a few dollars to several hundred per month. The services are generally priced according to the volume of traffic to be hurled at the target, the duration of each attack, and the number of concurrent attacks allowed.

Prosecutors in Los Angeles say the booter sites supremesecurityteam[.]com and royalstresser[.]com were the brainchild of Jeremiah Sam Evans Miller, a.k.a. “John the Dev,” a 23-year-old from San Antonio, Texas. Miller was charged this week with conspiracy and violations of the Computer Fraud and Abuse Act (CFAA). The complaint against Miller alleges Royalstresser launched nearly 200,000 DDoS attacks between November 2021 and February 2022.

Defendant Angel Manuel Colon Jr., a.k.a Anonghost720 and Anonghost1337, is a 37-year-old from Belleview, Fla. Colon is suspected of running the booter service securityteam[.]io. He was also charged with conspiracy and CFAA violations. The feds say the SecurityTeam stresser service conducted 1.3 million attacks between 2018 and 2022, and attracted some 50,000 registered users.

Charged with conspiracy were Corey Anthony Palmer, 22, of Lauderhill, Fla, for his alleged ownership of booter[.]sx; and Shamar Shattock, 19, of Margate, Fla., for allegedly operating the booter service astrostress[.]com, which had more than 30,000 users and blasted out some 700,000 attacks.

Two other alleged booter site operators were charged in Alaska. John M. Dobbs, 32, of Honolulu, HI is charged with aiding and abetting violations of the CFAA related to the operation of IPStresser[.]com, which he allegedly ran for nearly 13 years until last month. During that time, IPstresser launched approximately 30 million DDoS attacks and garnered more than two million registered users.

Joshua Laing, 32, of Liverpool, NY, also was charged with CFAA infractions tied to his alleged ownership of the booter service TrueSecurityServices[.]io, which prosecutors say had 18,000 users and conducted over 1.2 million attacks between 2018 and 2022.

Purveyors of stressers and booters claim they are not responsible for how customers use their services, and that they aren’t breaking the law because — like most security tools — stresser services can be used for good or bad purposes. For example, all of the above-mentioned booter sites contained wordy “terms of use” agreements that required customers to agree they will only stress-test their own networks — and that they won’t use the service to attack others.

Dobbs, the alleged administrator of IPStresser, gave an interview to ZDNet France in 2015, in which he asserted that he was immune from liability because his clients all had to submit a digital signature attesting that they wouldn’t use the site for illegal purposes.

“Our terms of use are a legal document that protects us, among other things, from certain legal consequences,” Dobbs told ZDNet. “Most other sites are satisfied with a simple checkbox, but we ask for a digital signature in order to imply real consent from our customers.”

But the DOJ says these disclaimers usually ignore the fact that most booter services are heavily reliant on constantly scanning the Internet to commandeer misconfigured devices that are critical for maximizing the size and impact of DDoS attacks.

“None of these sites ever required the FBI to confirm that it owned, operated, or had any property right to the computer that the FBI attacked during its testing (as would be appropriate if the attacks were for a legitimate or authorized purpose),” reads an affidavit (PDF) filed by Elliott Peterson, a special agent in the FBI’s Anchorage field office.

“Analysis of data related to the FBI-initiated attacks revealed that the attacks launched by the SUBJECT DOMAINS involved the extensive misuse of third-party services,” Peterson continued. “All of the tested services offered ‘amplification’ attacks, where the attack traffic is amplified through unwitting third-party servers in order to increase the overall attack size, and to shift the financial burden of generating and transmitting all of that data away from the booter site administrator(s) and onto third parties.”

According to U.S. federal prosecutors, the use of booter and stresser services to conduct attacks is punishable under both wire fraud laws and the Computer Fraud and Abuse Act (18 U.S.C. § 1030), and may result in arrest and prosecution, the seizure of computers or other electronics, as well as prison sentences and a penalty or fine.

The charges unsealed today stemmed from investigations launched by the FBI’s field offices in Los Angeles and Alaska, which spent months purchasing and testing attack services offered by the booter sites.

A similar investigation initiating from the FBI’s Alaska field office in 2018 culminated in a takedown and arrest operation that targeted 15 DDoS-for-hire sites, as well as three booter store defendants who later pleaded guilty.

The Justice Department says its trying to impress upon people that even buying attacks from DDoS-for-hire services can land Internet users in legal jeopardy.

“Whether a criminal launches an attack independently or pays a skilled contractor to carry one out, the FBI will work with victims and use the considerable tools at our disposal to identify the person or group responsible,” said Donald Alway, the assistant director in charge of the FBI’s Los Angeles field office.

“Potential users and administrators should think twice before buying or selling these illegal services,” said Special Agent Antony Jung of the FBI Anchorage field office. “The FBI and our international law enforcement partners continue to intensify efforts in combatting DDoS attacks, which will have serious consequences for offenders.”

The United Kingdom, which has been battling its fair share of domestic booter bosses, in 2020 started running online ads aimed at young people who search the Web for booter services. And in Europe, prosecutors have even gone after booter customers.

In conjunction with today’s law enforcement action, the FBI and the Netherlands Police joined authorities in the U.K. in announcing they are now running targeted placement ads to steer those searching for booter services toward a website detailing the potential legal risks of hiring an online attack.

“The purpose of the ads is to deter potential cyber criminals searching for DDoS services in the United States and around the globe, as well as to educate the public on the illegality of DDoS activities,” the DOJ said in a press release.

Here is the full list of booter site domains seized (or in the process of being seized) by the DOJ:

api-sky[.]xyz
astrostress[.]com
blackstresser[.]net
booter[.]sx
booter[.]vip
bootyou[.]net
brrsecurity[.]org
buuter[.]cc
cyberstress[.]us
defconpro[.]net
dragonstresser[.]com
dreams-stresser[.]io
exotic-booter[.]com
freestresser[.]so
instant-stresser[.]com
ipstress[.]org
ipstress[.]vip
ipstresser[.]com
ipstresser[.]us
ipstresser[.]wtf
ipstresser[.]xyz
kraysec[.]com
mcstorm[.]io
nightmarestresser[.]com
orphicsecurityteam[.]com
ovhstresser[.]com
quantum-stresser[.]net
redstresser[.]cc
royalstresser[.]com
securityteam[.]io
shock-stresser[.]com
silentstress[.]net
stresser[.]app
stresser[.]best
stresser[.]gg
stresser[.]is
stresser[.]net/stresser[.]org
stresser[.]one
stresser[.]shop
stresser[.]so
stresser[.]top
stresserai[.]com
sunstresser[.]com
supremesecurityteam[.]com
truesecurityservices[.]io
vdos-s[.]co
zerostresser[.]com

This entry was posted on Wednesday 14th of December 2022 02:58 PM

DDOS-FOR-HIRE NE'ER-DO-WELL NEWS

Press release from feds:
Federal Prosecutors in Alaska and Los Angeles Charge 6 Defendants with Operating Websites that Offered Computer Attack Services
As Part of International Efforts Targeting So-Called ‘Booter’ Services, FBI Seizes 48 Internet Domains that Offered DDoS-for-Hire Services.
ANCHORAGE – The Justice Department today announced the court-authorized seizure of 48 internet domains associated with some of the world’s leading DDoS-for-hire services, as well as criminal charges against six defendants who allegedly oversaw computer attack platforms commonly called “booter” services.

The FBI is now in the process of seizing the websites that allowed paying users to launch powerful distributed denial-of-service, or DDoS, attacks that flood targeted computers with information and prevent them from being able to access the internet. Booter services such as those named in this action allegedly attacked a wide array of victims in the United States and abroad, including educational institutions, government agencies, gaming platforms and millions of individuals. In addition to affecting targeted victims, these attacks can significantly degrade internet services and can completely disrupt internet connections.

The websites targeted in this operation were used to launch millions of actual or attempted DDoS attacks targeting victims worldwide. While some of these services claimed to offer “stresser” services that could purportedly be used for network testing, the FBI determined these claims to be a pretense, and “thousands of communications between booter site administrators and their customers…make clear that both parties are aware that the customer is not attempting to attack their own computers,” according to an affidavit filed in support of court-authorized warrants to seize the booter sites.

The coordinated law enforcement action comes just before the Christmas holiday period, which typically brings a significant increase in DDoS attacks across the gaming world.

In conjunction with the website seizures, the FBI, the United Kingdom’s National Crime Agency (NCA) and the Netherlands Police have launched an advertising campaign using targeted placement ads in search engines, which are triggered by keywords associated with DDoS activities. The purpose of the ads is to deter potential cyber criminals searching for DDoS services in the United States and around the globe, as well as to educate the public on the illegality of DDoS activities.

“Communities in Alaska have become increasingly dependent on access to broadband internet for essential services,” said U.S. Attorney S. Lane Tucker, District of Alaska. “Cyber criminals are not concerned with borders between states or nations but they should be on notice that we will work with law enforcement partners nationally and internationally to pursue and disrupt cybercrime services targeting Alaskans.”

“These DDoS-for-hire websites, with paying customers both inside and outside the United States, facilitated network disruptions on a massive scale, targeting millions of victim computers around the world,” said Special Agent in Charge Antony Jung of the FBI Anchorage Field Office. “Potential users and administrators should think twice before buying or selling these illegal services. The FBI and our international law enforcement partners continue to intensify efforts in combatting DDoS attacks, which will have serious consequences for offenders.”

The law enforcement actions this week include the filing of charges against six defendants across the United States who allegedly offered booter services. Each defendant allegedly operated at least one website that offered one-stop services and subscriptions of various lengths and attack volumes. In each of these criminal cases, the FBI posed as a customer and conducted test attacks to confirm that the booter site functioned as advertised.

District of Alaska

The defendants charged in criminal informations filed in Alaska are:

John M. Dobbs, 32, of Honolulu, Hawaii, is charged with aiding and abetting violations of the computer fraud and abuse act related to the alleged operation of a booter service named IPStressor.com, also known as IPS, between 2009 and November 2022.
Joshua Laing, 32, of Liverpool, New York, is charged with aiding and abetting violations of the computer fraud and abuse act related to the alleged operation of a booter service named TrueSecurityServices.io between 2014 and November 2022.
The two defendants have been informed of the charges against them and are expected to make their initial court appearance early next year.

Assistant U.S. Attorney Adam Alexander is prosecuting the Alaska cases.

Central District of California

Prosecutors in Los Angeles this week filed four criminal informations charging four defendants with running booter services.

The defendants charged in Los Angeles are:

Jeremiah Sam Evans Miller, aka “John The Dev,” 23, of San Antonio, Texas, who is charged with conspiracy to violate and violating computer fraud and abuse act related to the alleged operation of a booter service named RoyalStresser.com (formerly known as Supremesecurityteam.com).
Angel Manuel Colon Jr., aka “Anonghost720” and “Anonghost1337,” 37, of Belleview, Florida, who is charged with conspiracy to violate and violating the computer fraud and abuse act related to the alleged operation of a booter service named SecurityTeam.io.
Shamar Shattock, 19, of Margate, Florida, who is charged with conspiracy for allegedly running a booter service known as Astrostress.com.
Cory Anthony Palmer, 22, of Lauderhill, Florida, who is charged with conspiracy for allegedly running a booter service known as Booter.sx.
The four defendants have been informed of the charges against them and are expected to make their initial court appearances in United States District Court in Los Angeles early next year.

Assistant United States Attorneys Cameron L. Schroeder, Chief of the Cyber and Intellectual Property Crimes Section, and Aaron Frumkin, also of the Cyber and Intellectual Property Crimes Section, are prosecuting the Los Angeles cases. Assistant United States Attorney James Dochterman of the Asset Forfeiture and Recovery Section is handling the seizure of the domains.

In recent years, booter services have continued to proliferate as they offer a low barrier to entry for users looking to engage in cybercriminal activity. These types of DDoS attacks are so named because they result in the “booting” or dropping of the targeted computer from the internet. For additional information on booter and stresser services and the harm that they cause, please visit: https://www.fbi.gov/contact-us/fiel...ensify-efforts-to-combat-illegal-ddos-attacks.

The cases announced today are being investigated by the FBI’s Anchorage and Los Angeles field offices.

Invaluable assistance was provided by the FBI field offices in Albany, Honolulu, Miami, Philadelphia and San Antonio; the United Kingdom’s National Crime Agency; the Netherlands Police; EUROPOL; and the Brandon Police Service in Manitoba, Canada. Akamai, Cloudflare, Digital Ocean, Entertainment Software Association, Google, Oracle, Palo Alto Networks Unit 42, PayPal, Unit 221B, University of Cambridge, Yahoo and other valued private sector partners provided additional assistance.

These law enforcement actions were taken as part of Operation Power OFF, an ongoing, coordinated effort among international law enforcement agencies aimed at dismantling criminal DDoS-for-hire infrastructures worldwide, and holding accountable the administrators and users of these illegal services.

In a previous law enforcement action involving prosecutors and investigators in Anchorage and Los Angeles four years ago, the Justice Department charged three defendants who facilitated DDoS-for hire services and seized 15 internet domains associated with DDoS-for-hire services. The multi-prong investigation announced today builds on the success of the prior cases by targeting all known booter sites, shutting down as many as possible, and undertaking a public education campaign.

Criminal informations contain allegations, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
 
Last edited:
Skimmed through the press release, couldn't find how hard they're going at them so looked up the sentencing for computer fraud instead. Apparently we're talking minimum 20 years imprisonment, which sounds about right for outdated tech laws meant to punish people trying to hack into government infrastructure and steal national secrets.
 
Skimmed through the press release, couldn't find how hard they're going at them so looked up the sentencing for computer fraud instead. Apparently we're talking minimum 20 years imprisonment, which sounds about right for outdated tech laws meant to punish people trying to hack into government infrastructure and steal national secrets.
Something like 2 years is more likely https://krebsonsecurity.com/2022/06/downthem-ddos-for-hire-boss-gets-2-years-in-prison/
 
It’d be interesting to see if this goes on to correlate with a decrease in daily dilation of stinkditch against the farms.
 
Skimmed through the press release, couldn't find how hard they're going at them so looked up the sentencing for computer fraud instead. Apparently we're talking minimum 20 years imprisonment, which sounds about right for outdated tech laws meant to punish people trying to hack into government infrastructure and steal national secrets.
DDoS is an attack on basic infrastructure and should be treated as terrorism. Cut off their thumbs.

Also any idiot doing this in the U.S. is a moron when the world is full of absolute shitholes who couldn't care less if you DDoS all day so long as you don't attack shit in the country you're in. So tack on a felony stupidity charge too.
 
Skimmed through the press release, couldn't find how hard they're going at them so looked up the sentencing for computer fraud instead. Apparently we're talking minimum 20 years imprisonment, which sounds about right for outdated tech laws meant to punish people trying to hack into government infrastructure and steal national secrets.
So that's why the site is running better.
 
Doesn't reddit have the same shit? Communities dedicated around watching people die?

Yes, Reddit had r/watchpeopledie, which was eventually banned in 2019 after the Christchurch shooting. It had close to half a million subs.

This still exists: https://www.reddit.com/r/watchpeoplealmostdie

A while back I found this on Twatter but forgot to post this. The German title translates: "This is why the kiwi is rightwing - Terms, codes and slang"

DarumIstDieKiwiRechts.jpg

Did have time to watch the video itself.
 
So that's why the site is running better.
I remember a few days ago the site was running slowly especially on posts and reactions, and right about the time this happened everything was suddenly snappy again.

I wish I'd paid attention to the time. It would be a hoot if one of these sites was in the process of DDoSing us right when the feds showed up to bag and tag everything and frog-march one of these fuckers into the party van.
 
I love it how the troons were convinced that #DropKiwiFarms would remove us from the internet forever and that there was no way to come back from this, and that transphobia was now finally solved now that the ontologically evil KiwiFarms who support stochastic terrorism were gone.

And yet, a couple of months later, we're sneeding like we have never sneeded. Look at them now, Keffals busy sperging about other stupid stuff and thinking he's a super cute and hot girl uWu, LFJ busy with looking like he's a techie on that fucking site he replaced his Twitter with, and that troon laywer getting BTFO'd by a house representative... Rofl, get fucked eunuchs, YWNBAW.
 
Last edited:
Status
Not open for further replies.
Back
Top Bottom