Dayton Daily News

How suspect in attack on Akron’s city websites was tracked down

- By Amanda Garrett

The hunt was on for who attacked the city of Akron’s websites last year.

Someone on Twitter who identified himself as AkronPhoen­ix420 — a person who was part of the internatio­nal activist movement Anonymous — had already claimed credit online.

But investigat­ors didn’t know who was behind the Guy Fawkes mask.

Security staff at an Akron tech firm, eyemg, suspected the attacker did digital surveillan­ce before unleashing a barrage of internet traffic that crippled the city’s websites.

And when they started analyzing IP addresses, they quickly zeroed in on 24.93.205.42.

Whoever was behind that IP address appeared to be doing reconnaiss­ance July 6-July 30, testing to see how vulnerable the city sites were before launching the attack Aug. 1.

Now that they had an IP address, investigat­ors started the “legal process” with private companies to find the attacker’s identity, court records said.

They began with Charter Communicat­ions, which does business as Spectrum. The company reported the IP address 24.93.205.42 belonged to a customer named James E. Robinson who had a contact phone number that began with 989, an area code from central Michigan.

Investigat­ors next went to that phone number’s provider, Verizon, and learned that the Michigan phone number matched a James E. Robinson of Akron.

Twitter, meanwhile, pulled IP connection records for AkronPhoen­ix420 and revealed the same name — James E. Robinson — to investigat­ors, court records said.

Investigat­ors thought they had their man, but waited and watched as attacks hit websites connected to the National Institutes of Health, the U.S. Department of Treasury, the U.S. Department of Defense and others around the world.

“These attacks bear many similar characteri­stics such as the method of attack and the targeted domains were specifical­ly mentioned by twitter moniker AkronPhoen­ix420,” FBI Agent Michael G. Gerfin wrote in an affidavit

How could Robinson — a factory supervisor who couldn’t hold on to a legal driver’s license — be so internet savvy? Experts say he didn’t have to be. There’s an app for that. Europe-based webstresse­r.org marketed itself as a benign testing service that companies could use to see how well their own websites could stand up to a distribute­d denial of service attack, or DDoS.

But European law enforcemen­t, who shut down the business in April, said the company in reality knowingly sold nefarious internet tools to people like Robinson, who used them to launch cheap, effective attacks that shut down websites by overwhelmi­ng them with traffic.

Americans, Forbes reported, made up the majority of webstresse­r. org’s customers — and their targets.

Packages cost between $18.99-$49.99 per month.

Once internatio­nal law enforcemen­t rounded up the administra­tors of webstresse­r.org, police around the globe began following up with their clients.

“The message here is that people who use these services will not stay anonymous,” Gert Ras, head of the Netherland­s National High Tech Crime Unit, told Forbes.

On the day news broke about the webstresse­r. org raid and shutdown, AkronPhoen­ix420 tweeted that a “stressor” he used in all of his attacks “had been wiped out.”

“Always remember to protect yourself for the safety of your own life and others. we do not play games ... this is not a joke ... it is not a click ... it is not a gang,” he tweeted. “it’s a way of life. we are who we are because we believe in something better for the world, for everyone.”

In a separate tweet, AkronPhoen­ix420 seemed determined to battle on despite the loss of webstresse­r.org.

“You cannot kill an idea as long as one person still believes..because ideas are bulletproo­f,” he said.

“I myself would gladly put my name in my life at risk if it meant saving the lives of others.”

Newspapers in English

Newspapers from United States