11 December 2024

Global police op shuts down major DDoS platforms


Global police op shuts down major DDoS platforms

A joint law enforcement operation involving police agencies from multiple countries has dismantled 27 of the most popular platforms used to launch Distributed Denial-of-Service (DDoS) attacks.

Known as "booter" and "stresser" websites, the platforms allowed cybercriminals and hacktivists to overwhelm online services with traffic, rendering them inaccessible.

The crackdown led to the seizure of major DDoS service platforms, including zdstresser.net, orbitalstress.net, and starkstresser.net. These websites, which often marketed themselves as tools for testing network security, were widely misused for illegal purposes.

The operation, codenamed ‘PowerOFF’, is part of a coordinated global effort led by Europol, involving agencies from 15 countries. It targeted every level of involvement in this criminal activity, from platform administrators to end-users. As part of the effort, three suspected administrators were arrested in France and Germany and 300 users were identified engaged in planning further DDoS attacks.

Victims of such attacks face severe consequences, including financial losses, reputational damage, and operational chaos. The motivations behind these cybercrimes vary. Some attackers pursue financial gain or economic sabotage, while others are driven by ideological reasons, such as those seen in hacktivist groups like Killnet or Anonymous Sudan.

Additionally, law enforcement is launching an online advertising campaign to discourage individuals from engaging in illegal activities. The campaign emphasizes the legal and personal consequences of DDoS attacks and is designed to reach potential offenders in the digital spaces they frequent.

The campaign includes Google Search ads displaying targeted deterrence messages to individuals searching for DDoS-for-hire tools, and YouTube Ads demonstrating preventative messages with viewers watching tutorials on using DDoS-for-hire services.

Law enforcement will also employ additional measures, including conducting knock-and-talk visits, sending over 250 warning letters, and delivering more than 2,000 emails to individuals linked to illegal activities.


Back to the list

Latest Posts

Cybersecurity Week in Review: January 24, 2025

Cybersecurity Week in Review: January 24, 2025

In brief: SonicWall SMA zero-day exploited in attacks, hackers are exploiting older Ivanti flaws, and more.
24 January 2025
AIRASHI DDoS botnet exploits a zero-day vulnerability in cnPilot routers

AIRASHI DDoS botnet exploits a zero-day vulnerability in cnPilot routers

The attacks have been active since June 2024.
23 January 2025
SonicWall SMA zero-day exploited in attacks

SonicWall SMA zero-day exploited in attacks

SonicWall has released a patch in version 12.4.3-02854 and higher versions to address the issue.
23 January 2025