The intent of the individuals who created the DDoS attacks has nothing to do with hacking, and they are vandals, not hackers.
Kevin MitnickBoth social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.
Kevin MitnickA company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if an attacker can call one trusted person within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted.
Kevin Mitnick