{"id":195,"date":"2026-05-12T12:10:29","date_gmt":"2026-05-12T15:10:29","guid":{"rendered":"https:\/\/miraiguard.com\/learn\/?p=195"},"modified":"2026-05-12T12:10:29","modified_gmt":"2026-05-12T15:10:29","slug":"ddos-attacks-are-federal-crimes-in-the-u-s","status":"publish","type":"post","link":"https:\/\/miraiguard.com\/learn\/ddos-attacks-are-federal-crimes-in-the-u-s\/","title":{"rendered":"DDoS Attacks Are Federal Crimes in the U.S"},"content":{"rendered":"<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">There&#8217;s a pattern I see repeatedly when talking to website owners who&#8217;ve been taken offline by a DDoS attack: they treat the incident as a technical problem. They call their hosting support, wait for the attack to subside, and move on. Nobody files a report. Nobody preserves evidence. The attacker faces zero consequences.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">That cycle needs to stop.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">What most people outside the United States don&#8217;t fully appreciate \u2014 and what matters enormously if you operate a website with American users or infrastructure \u2014 is that launching a DDoS attack against a U.S.-based system is a <strong>federal crime<\/strong>. Not a gray area. Not an administrative infraction. A federal crime, prosecuted by the same system that handles bank fraud and organized criminal networks.<\/p>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">What Federal Law Actually Says<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The <strong>Computer Fraud and Abuse Act (CFAA)<\/strong>, codified at 18 U.S.C. \u00a7 1030, is the primary federal statute governing computer crimes in the United States. Under this law, intentionally causing damage to a protected computer \u2014 which includes any server connected to the internet in the U.S. \u2014 constitutes a federal offense. DDoS attacks fall squarely within that definition.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The penalties are serious. Depending on the severity and prior record, a conviction can carry up to 10 years in federal prison. For attacks targeting critical infrastructure \u2014 hospitals, financial systems, government services \u2014 sentencing can be significantly higher.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Critically: the CFAA doesn&#8217;t require the attacker to be physically located in the United States. If the attack <strong>affected a U.S. system<\/strong>, federal jurisdiction can apply. The Department of Justice has successfully prosecuted individuals located abroad for cybercrimes committed remotely against American targets. This isn&#8217;t legal theory \u2014 it&#8217;s established case law.<\/p>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The FBI Is Not Treating This Lightly<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">In a formal public statement, the FBI declared it is <strong>intensifying efforts to combat illegal DDoS attacks<\/strong>. The document \u2014 available on the FBI&#8217;s own website \u2014 is unambiguous: the Bureau is actively investigating botnet operators, DDoS-for-hire services (commonly called &#8220;booters&#8221; and &#8220;stressers&#8221;), and anyone who uses or sells that infrastructure.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">In the same statement, the FBI directs victims to file a complaint with the <strong>IC3 \u2014 Internet Crime Complaint Center<\/strong> at ic3.gov, regardless of the financial loss amount or when the incident occurred. That last part matters: the IC3 accepts reports of past attacks, not just ongoing ones. Every complaint feeds the federal database and helps build cases against criminal networks that have operated for years without accountability.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">If your website was hit by a DDoS attack and you have users or infrastructure in the United States: you have the right to file a formal complaint with the FBI. You should use it.<\/p>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Why Victims Don&#8217;t Report \u2014 and Why That&#8217;s a Problem<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Most victims don&#8217;t file reports for three reasons: they assume the damage was too minor for the government to care about, they believe identifying the attacker is impossible, or they simply don&#8217;t know a federal reporting channel exists.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">All three assumptions are wrong.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The FBI has no minimum damage threshold for opening a cybercrime investigation. The attribution capabilities available to federal agencies \u2014 subpoenas to hosting providers, international law enforcement cooperation, botnet infrastructure analysis \u2014 operate at a scale far beyond what any private company can do independently. And the IC3 exists precisely to receive this category of complaint.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">What&#8217;s missing in most cases is documentation. Server logs. Timestamps. Traffic data captured during the attack window. Without preserved evidence, even the best federal investigator has very little to work with.<\/p>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">What To Do When Your Site Is Under Attack<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>First and most important: don&#8217;t delete anything.<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Your server logs during an attack are forensic evidence. If those files were cleared or overwritten before being captured, you&#8217;ve lost your primary investigative asset.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The correct sequence is:<\/p>\n<ol class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-decimal flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"font-claude-response-body whitespace-normal break-words pl-2\"><strong>Document everything in real time.<\/strong> Request volume, source IP ranges, attack type (GET flood, POST flood, Slowloris, etc.), precise timestamps from the moment the attack begins.<\/li>\n<li class=\"font-claude-response-body whitespace-normal break-words pl-2\"><strong>Archive server logs to an external location.<\/strong> Many servers automatically rotate or overwrite logs after a set period \u2014 export before that happens.<\/li>\n<li class=\"font-claude-response-body whitespace-normal break-words pl-2\"><strong>Record the impact.<\/strong> Screenshots from your monitoring dashboard, availability metrics, revenue loss estimates if applicable.<\/li>\n<li class=\"font-claude-response-body whitespace-normal break-words pl-2\"><strong>File a complaint at IC3.gov.<\/strong> It takes under 15 minutes. The form is straightforward and doesn&#8217;t require legal expertise to complete.<\/li>\n<li class=\"font-claude-response-body whitespace-normal break-words pl-2\"><strong>Contact your local FBI field office<\/strong> if the attack is large-scale or targets critical services. The full directory is available at fbi.gov\/contact-us\/field-offices.<\/li>\n<\/ol>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Difference Between Absorbing an Attack and Being Prepared for One<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Most hosting solutions treat DDoS as something to be absorbed \u2014 they apply generic rate limits, block obvious IP ranges, and wait for the attacker to give up. Against unsophisticated scripts, that sometimes works. Against well-executed Layer 7 attacks, it doesn&#8217;t.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Application-layer attacks are categorically different because the traffic looks legitimate. A properly configured bot sends correct HTTP headers, realistic user-agents, plausible session behavior. A simple rate limiter can&#8217;t distinguish that traffic from a real user. The server processes each request, executes database queries, generates responses \u2014 and collapses not from raw volume, but from resource exhaustion.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Mitigating Layer 7 requires real-time behavioral analysis: access patterns, per-endpoint request distribution, cross-IP correlation, anomaly detection across session sequences. It&#8217;s a traffic intelligence problem, not a firewall rule problem.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">That&#8217;s the specific problem Mirai Guard is built to solve \u2014 not as a feature checkbox in a larger platform, but as the singular focus. Every protection configuration is handled by people who understand application-layer attacks in depth, calibrated to each site&#8217;s actual traffic profile, and actively monitored. When an attack begins, the response isn&#8217;t generic \u2014 it&#8217;s technically contextual.<\/p>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Institutional Dimension<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">There&#8217;s an angle that rarely comes up in technical discussions about DDoS that deserves explicit attention: the cybersecurity industry&#8217;s role in combating these crimes isn&#8217;t just technical \u2014 it&#8217;s institutional.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The FBI cannot investigate what isn&#8217;t reported. Federal authorities have no visibility into attacks affecting websites outside the U.S. unless victims use available reporting channels. Every complaint that doesn&#8217;t get filed is a gap in the map that federal investigators spend years building to identify criminal infrastructure.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Organizations operating in this space \u2014 that see attack traffic at a level of technical detail most victims never access \u2014 carry a responsibility that extends beyond protecting their own clients. Documenting, educating victims, and when authorized, contributing technical evidence to federal investigations, is part of the work.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">That&#8217;s how we understand our role at Mirai Guard. The technical defense and the institutional responsibility aren&#8217;t separate things. They&#8217;re the same thing.<\/p>\n<hr class=\"border-border-200 border-t-0.5 my-3 mx-1.5\" \/>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><em>If your website was targeted by a DDoS attack, file your complaint at <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/www.ic3.gov\">ic3.gov<\/a>. If your site is under attack now or you want to ensure you&#8217;re protected before an incident occurs, <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/miraiguard.com\/app\/register\">contact Mirai Guard<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a pattern I see repeatedly when talking to website owners who&#8217;ve been taken offline by a DDoS attack: they treat the incident as a technical problem. They call their hosting support, wait for the attack to subside, and move on. Nobody files a report. Nobody preserves evidence. The attacker faces zero consequences. That cycle [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-195","post","type-post","status-publish","format-standard","hentry","category-attacks"],"views":2,"_links":{"self":[{"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/posts\/195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/comments?post=195"}],"version-history":[{"count":1,"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/posts\/195\/revisions"}],"predecessor-version":[{"id":196,"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/posts\/195\/revisions\/196"}],"wp:attachment":[{"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/media?parent=195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/categories?post=195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/miraiguard.com\/learn\/wp-json\/wp\/v2\/tags?post=195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}