A UK man is facing almost three years in the slammer after pleading guilty in the UK to creating and using a botnet and possessing criminal property.
Daniel Kaye (aka “BestBuy”), 30, from Egham, Surrey (UK) received a sentence of two years and eight months in prison for DDoS attacks targeting the Liberian telecommunications provider Lonestar MTN in 2015.
Kaye first used rented botnets and stressor services to attack Lonestar, according to the UK National Crime Agency (NCA). He was paid for the service by a senior official at Cellcom, a rival Liberian network provider.
Almost a year later, in late 2016, he took advantage of the fact the source code for the Mirai IoT DDoS botnet leaked online to create his own Mirai botnet consisting of infected Dahua security cameras.
It turned out in November 2016, the traffic from Kaye’s botnet was so high in volume it disabled Internet access across Liberia.
Lonestar said it lost tens of millions in US dollars in revenues due to the constant attacks, and to have spent approximately $600,000 on fighting them.
Kaye was also behind the November 2016 attack that affected one million Deutsche Telekom customers – an attempt to rope routers into a Mirai botnet.
He was arrested in February 2017, extradited to Germany, faced a German court, admitted his guilt, and received a suspended sentence.
After being extradited to the UK, Kaye pleaded guilty to creating and using a botnet and possessing criminal property, and received 2 years, 8 months prison sentence.