10

I used to go on a site called blockchain.info For storing bitcoins but today when I entered the URL I was redirected to a phishing page. I have entered all my information and it was obviously sent to the phiser well Then I have realised it was a phishing page I directly reported it to block chain and changed my password my question is. Is it illegal to ddos their site?

I live in KSA if that helps. Here is the phising page:

http://lblockclhain.info/us/login.htm
Anders
  • 64,406
  • 24
  • 178
  • 215
aqw alhadary
  • 103
  • 1
  • 6
  • 23
    I am no lawyer, but in general vigilante justice is not legal... Would not do that if I were you. – Anders Oct 23 '16 at 19:07
  • 1
    Are you sure that the domain is compromised ? I have been using it myself during the past 2 hours and didn't see anything suspicious ... You should better check your computer. – Xavier59 Oct 23 '16 at 19:25
  • 1
    I think if a thief steals from another thief, it's punishable by law, right? – Vini7 Oct 23 '16 at 19:28
  • 9
    Instead of DDoS (which could have side-effects) what about submitting lots of fake credentials to the page to poison his database and make him work harder to tell the real credentials from the fake? – André Borie Oct 23 '16 at 22:03
  • 2
    @AndréBorie you should turn that into an answer! that is an actual reason to help protect yourself – dalearn Oct 23 '16 at 23:59
  • @Xavier59 [Blockchain's DNS really was hijacked a few days ago.](https://www.google.com/search?q=blockchain+dns+hijack&ie=UTF-8) – Matt Nordhoff Oct 24 '16 at 00:51
  • Related: http://security.stackexchange.com/questions/80360/should-i-take-over-a-compromised-website-from-another-hacker – S.L. Barth Oct 24 '16 at 06:40
  • According to [this update](https://blog.blockchain.com/2016/10/13/security-update-yesterdays-dns-attack/) from blockchain, you would get a warning about an invalid SSL certificate before arriving on the phishing page? Did you ignore that warning and type in your credentials anyway? – kasperd Oct 24 '16 at 07:32

5 Answers5

37

If you do a DDoS by sending large amounts of traffic to that site, you're very likely creating a lot of collateral damage since other services in (parts of) the network will suffer as well if the network is saturated.

Also, very often phishers use hacked websites (for example poorly managed and outdaged Wordpress installs) to host their phishing sites, so you're not just attacking the phisher, but also a (mostly) innocent victim of that phisher.

And as others pointed out, just as in 'the real world' (which this is just as much a part of), you shouldn't take matters into your own hands.

The right thing to do, is either complain to the owner of the site or the network hosting it, or report it to the website being phished. Especially banks often have dedicated teams (or hire companies) which are specialised in taking down phishing sites.

In addition: you must consider that, when you are DDoS'ing a website, you're not attacking the web "per se" but the whole server, so you're causing the damage to the webhosting server (that may propagate among other websites hosted in the same server).

Finally: Most laws in most countries consider illegal to send any cyber-attack, it does not matter if it is against a legal or illegal target.

KanekiDev
  • 1,039
  • 6
  • 9
Teun Vink
  • 6,788
  • 2
  • 27
  • 35
  • 1
    A (D)DoS causing a "victim" hacked WordPress site to go offline isn't that bad, because: 1) the server cannot be used for other attacks and/or 2) the website owner is alerted that something needs attention. – Rob W Oct 23 '16 at 23:00
  • 9
    And what happens when that machine is a VPS that hosts other, uncompromised sites? – Talisman Oct 23 '16 at 23:26
  • 14
    DDoS is like cutting power to a city block because there are some criminals in there using electricity. A single website uses a tiny, fractional amount of server resources that are shared by many legit websites. DDoS does not discriminate. – Nelson Oct 24 '16 at 01:28
13

Report the phishing site so browsers can warn the users and show red pages. It's much more efficient and it's completely legal: https://www.google.com/safebrowsing/report_phish/

hunyadym
  • 231
  • 1
  • 4
5

As everyone else says, It's a bad idea. But something else to consider. Even if you could pinpoint your attack at just that server with absolutely no other collateral damage... Many of these wordpress sites are up on cheap shared hosting. A lot of these hosting packages are cheap because they put tens of thousands of sites on the same server. So taking down that one server will still shut down a lot of other sites that don't deserve to be.

DAB
  • 161
  • 5
0

The legality of this will vary due to the laws in your respective country. That said, in this day and age, DDoS'ing anyone is generally not looked at favorably.

You also should look at it this way: Is this course of action an ethical way to deal with the situation?

Reporting the webpage to the hosting company would be a completely legal and ethical way to go.

Also, think of potential consequences to DDoS'ing the site. The person or group running the page is an unknown quantity when it comes to being able to figure out the origination of an attack......I'll just leave it at that as I am going WAY off the original question lol

Edit on Oct 23rd 2016: I found this Article on KSA Cyber Crime Law.

There is one section, where it states "Creating websites or programs that violate any of the Kingdom’s general laws, Islamic values or public ethics."

I would assume that public ethics, would be against DDoS'ing someone who is running a phishing site......even though phishing is unethical as well.

NZKshatriya
  • 121
  • 5
0

Running a phishing site is typically against the TOS of the ISP. The first action would be to contact the ISP serving the site.

Then contacting local law enforcement (less effective). Local this case, being local to the ISP of the site, not necessarily your local law enforcement. Whether DDOS'ing is illegal in Saudi Arabia is outside my knowledge, but it's not the most effective answer.

Shackledtodesk
  • 1,201
  • 10
  • 10