The British man who orchestrated a series of DDoS attacks that disrupted Internet access across the African nation of Liberia in November 2016 has been sentenced to two years and eight months in prison.
Daniel Kaye, 30, from Egham, Surrey, pleaded guilty last December of using botnets and stressors to bombard Liberian telecom provider Lonestar MTN with malicious traffic. At the time of the attacks, which began in October 2015, Kaye was living in Peyia, Cyprus, working for Cellcom, a competing telecom company.
In September 2016, Kaye starting using his own version of the Mirai IoT botnet to carry out high-volume DDoS attacks, according to a press release from the UK's National Crime Agency. Two months later, the attacks disabled Liberia's Internet access, forcing Lonestar to spend roughly $600,000 to remediate the problem. Kaye was subsequently arrested in the U.K. in February 2017.
Reportedly known to use the hacker alias "BestBuy," Kaye received his sentence at Blackfriars Crown Court in London. In July 2017 Kaye previously pleaded guilty in German court to disrupting the service of more than 900,000 Deutsche Telekom customers while attempting to recruit their devices into his botnet. Kaye received a suspended sentence for his actions before being extradited back to the U.K.
The same Mirai botnet used in the Deutsche Telekom attack was also responsible for knocking thousands of British TalkTalk and Post Office internet subscribers offline around the same time period.
"Daniel Kaye was operating as a highly skilled and capable hacker-for-hire," said Mike Hulett, head of operations at the U.K. National Crime Agency's National Cyber Crime Unit. "His activities inflicted substantial damage on numerous businesses in countries around the world, demonstrating the borderless nature of cybercrime. The victims in this instance suffered losses of tens of millions of dollars and had to spend a large amount on mitigating action."