spokesperson
Josh Earnest responds on October 21, 2016, the day of the attack The
US Department of Homeland Security started an investigation into the attacks, according to a
White House source. No group of hackers claimed responsibility during or in the immediate aftermath of the attack. Dyn's chief strategist Kyle York said in an interview that the assaults on the company's servers were very complex and unlike everyday DDoS attacks.
Barbara Simons, a member of the advisory board of the United States
Election Assistance Commission, said such attacks could affect
electronic voting for overseas military or civilians. Dyn stated that they were receiving malicious requests from tens of millions of
IP addresses. Mirai is designed to
brute-force the security on an IoT device, allowing it to be controlled remotely. Cybersecurity investigator
Brian Krebs noted that the source code for Mirai had been released onto the Internet in an
open-source manner some weeks prior, which made the investigation of the perpetrator more difficult. On 25 October 2016, US President Obama stated that the investigators still had no idea who carried out the cyberattack. On 13 December 2017, the Justice Department announced that three men (Paras Jha, 21, Josiah White, 20, and Dalton Norman, 21) had entered guilty pleas in cybercrime cases relating to the Mirai and clickfraud botnets. ==Perpetrators==