Its not that difficult. Any clever hacker can do this. Technically, they could use self replicating programs to invade any system they find, add thier call to the registry, send the signal to the creator containing the IP. That individual then would only have to sit back and wait. Collecting the zombie IP addresses. And when ready, send a signal to all of them, ordering the attack to begin.
But, i doubt this guy is that clever to be doing that, knowing full well that his server is a nice juicy unused playground for some people to destroy. But lucky for him we all wont sink to his pathetic level.