Sunday, January 5, 2025
HomeCyber Security NewsEuropol Shutsdown 27 DDoS Service Provider Platforms

Europol Shutsdown 27 DDoS Service Provider Platforms

Published on

SIEM as a Service

In a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15 countries, has taken down 27 illegal platforms facilitating Distributed Denial-of-Service (DDoS) attacks.

This takedown marks a significant blow to the cybercrime industry, disrupting one of the most common tools cybercriminals use to cause widespread disruption.

These platforms, known as ‘booter’ and ‘stresser’ websites, allowed users to launch DDoS attacks that overwhelm targeted websites and online services with massive traffic, rendering them inaccessible.

- Advertisement - SIEM as a Service

Europol’s coordinated efforts led to the arrest of three administrators responsible for running these platforms, while over 300 service users have been identified for further investigation.

Authorities targeted popular platforms such as zdstresser.net, orbitalstress.net, and starkstresser.net, which had been widely used by hackers and hacktivist groups.

The operation comes at a critical time, as the festive season is often exploited by cybercriminals to launch high-profile attacks.

These could range from financial sabotage to ideological campaigns orchestrated by groups like Killnet or Anonymous Sudan.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Global Collaboration and Investigative Expertise

Europol’s European Cybercrime Centre (EC3) played a pivotal role in coordinating this operation, facilitating technical sprints, and developing key investigative leads.

The Joint Cybercrime Action Taskforce (J-CAT), based at Europol’s headquarters, provided crucial analytical and forensic support, including advanced crypto-tracing techniques.

Participating countries included the United States, United Kingdom, Australia, Germany, Japan, and more, with each contributing resources to dismantle these criminal networks. Arrests were made in France and Germany, showcasing the international reach of the operation.

Beyond dismantling existing platforms, Operation PowerOFF aims to deter future offenders. A targeted online ad campaign will educate potential perpetrators, particularly young people, about the risks and legal consequences of engaging in DDoS-for-hire schemes.

Tailored messages will appear on Google and YouTube, where individuals often search for or learn about these illegal tools.

Additionally, law enforcement agencies will issue over 250 warning letters and 2,000 emails to users of these services, reinforcing the message that DDoS attacks are criminal acts with serious consequences.

Operation PowerOFF underscores the global commitment to combating cybercrime at all levels. By combining enforcement actions with deterrence campaigns, Europol and its international partners are making strides in protecting digital infrastructure and educating the public.

As this operation continues, it serves as a warning to cybercriminals: the era of operating with impunity is coming to an end.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...