DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Romanian Computer Hacker Sentenced to One Year in Federal Prison for Staging Denial of Service Attacks on ‘World of Warcraft’ Servers

Posted on May 9, 2018 by Dissent

May 7 – A Romanian computer hacker who orchestrated a series of distributed denial of service (DDoS) attacks on the European servers of the massively multiplayer online role-playing game World of Warcraft was sentenced today to one year in federal prison.

          Calin Mateias, 38, of Romania, was sentenced by United States District Judge Otis D. Wright II.

Mateias, who has been in custody since November 20 after being extradited from Romania, was also ordered to pay $29,987 in restitution to Blizzard Entertainment, the Irvine-based owner and operator of World of Warcraft, to compensate the company for labor costs associated with countering the computer attacks.

World of Warcraft is an online virtual world where players participate in a game using avatars. Mateias, using his in-game avatar, often participated in collaborative events, such as “raids,” where players joined forces to meet game objectives and were rewarded with virtual proceeds or in-game advantages. Mateias became involved in disputes with other players for a variety of reasons, including the division of loot and membership in raid teams.

Between February and September 2010, typically in connection with in-game disputes with other players, Mateias launched DDoS attacks on World of Warcraft servers in Europe. A DDoS attack is an attack on a computer network in which multiple computers are used to transmit a flood of superfluous requests to the target network, thereby overloading it, and making it unavailable to other users. Mateias’ DDoS attacks caused World of Warcraft servers to crash and prevented some paying customers from accessing the game.

After being indicted in this case in 2011 and extradited from Romania last year, Mateias pleaded guilty in February to one count of intentional damage to a protected computer.

This case is the result of an investigation by the Federal Bureau of Investigation.

The case was prosecuted by Assistant United States Attorney Khaldoun Shobaki of the Cyber & Intellectual Property Crimes Section.

 SOURCE U.S. Attorney’s Office, Central District of California

Related:

  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception? (1)
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • France Travail: At least 340,000 job seekers victims of new hack
  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
Category: Hack

Post navigation

← Delhi High Court Declines To Interfere With Arrest Of Suspected ‘Pro-Pak’ Kashmiri Hacker
Covington IoT Update: U.S. Legislative Roundup on IoT →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.