{
	"id": "a7e64273-d10c-45aa-84ad-a21b5bda571e",
	"created_at": "2026-04-06T00:22:08.809399Z",
	"updated_at": "2026-04-10T13:11:21.722423Z",
	"deleted_at": null,
	"sha1_hash": "a3079cd988102f5c2ea7f4d20d0598587d3c95b7",
	"title": "Turkish national charged for DDoS attacks with the WireX botnet",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 58693,
	"plain_text": "Turkish national charged for DDoS attacks with the WireX botnet\r\nBy Catalin Cimpanu\r\nPublished: 2022-12-14 · Archived: 2026-04-05 22:25:59 UTC\r\nUS authorities have indicted today a Turkish national for using a now-defunct malware botnet to launch\r\ndistributed denial-of-service (DDoS) attacks against a Chicago-based multinational hospitality company.\r\nIzzet Mert Ozek, 32, stands accused of using WireX, a botnet created using Android malware, to launch attacks\r\nagainst the Chicago multinational in August 2017.\r\nAuthorities said that Ozek's attacks made the infected Android smartphones send large amounts of web traffic to\r\nthe company's public website and online booking service, causing servers to go down.\r\nThe charges were unveiled today in the Northern District of Illinois, according to a press release from the US\r\nDepartment of Justice.\r\nNeither the official statement nor the official indictment [PDF] say if Ozek built the WireX botnet himself or if he\r\nrented it from a third party.\r\nCreated just a month before, in July 2017, the botnet quickly grew to a massive size of more than 120,000 bots\r\nafter its author used malicious Android apps to infect Android smartphones.\r\nMonths after the devastating attacks carried out using the Mirai malware at the end of 2016, the cyber-security\r\nindustry reacted with haste to kill this new threat while in its early stages.\r\nWeeks after the attack on the Chicago multinational company took place, a coalition of security firms including\r\nAkamai, Cloudflare, Flashpoint, Google, Dyn, RiskIQ, and Team Cymru, worked together to trace WireX's bots\r\nand backend infrastructure and then seize and take down its command and control systems [1, 2, 3].\r\nSource: https://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/\r\nhttps://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/"
	],
	"report_names": [
		"turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet"
	],
	"threat_actors": [],
	"ts_created_at": 1775434928,
	"ts_updated_at": 1775826681,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a3079cd988102f5c2ea7f4d20d0598587d3c95b7.pdf",
		"text": "https://archive.orkl.eu/a3079cd988102f5c2ea7f4d20d0598587d3c95b7.txt",
		"img": "https://archive.orkl.eu/a3079cd988102f5c2ea7f4d20d0598587d3c95b7.jpg"
	}
}