The Attack
We depend on the internet for data sharing, transactions, marketing or as a selling tool. Thus a reliable network infrastructure is becoming a necessity. Our research shows how a very simple tool can be abused to attack selected targets, bringing temporary but serious damages. The attacker uses an automated tool (program) to have large quantities of e-mails or SMS sent to the victim, which may cause damages to the infrastructure (service provider, phone network, etc). Furthermore, if cunningly performed, the attack cannot be traced back to the perpetrator. The picture below illustrates the two main phases of the attack.