Monday, November 25, 2024
HomeCyber CrimeDDoS-For-Hire Services - 15 Websites Has Been Seized That Offering DDoS Services

DDoS-For-Hire Services – 15 Websites Has Been Seized That Offering DDoS Services

Published on

DDoS-for-hire services seized by authorities in the United States and seized 15 Internet domains associated with the service.

These sites afford “booter” or “stresser” services that allowed users to launch a powerful DDoS attack against the targeted websites and makes inaccessible over the internet.

According to DOJ press release, “Booter services such as those named in this action allegedly cause attacks on a wide array of victims in the United States and abroad, including financial institutions, universities, internet service providers, government systems, and various gaming platforms.”

- Advertisement - SIEM as a Service

The authorities seized following 15 such providers who helped customers to launch a DDoS attack knocking websites and network providers offline.

anonsecurityteam[.]com
booter[.]ninja
bullstresser[.]net
critical-boot[.]com
defcon[.]pro
defianceprotocol[.]com
downthem[.]org
layer7-stresser[.]xyz
netstress[.]org
quantumnstress[.]net
ragebooter[.]com
request[.]rip
str3ssed[.]me
torsecurityteam[.]org
vbooter[.]org

DDoS Attack is one of most dangerous threat for any organization and the attack main aims to exhaust the resources of a network, application or service that leads an organization to face the various technical impacts.

All the services offered to attack infrastructre are tested by FBI and they are available at a very low cost. According to FBI analysis they detemined these services can cause disruptions of networks at all levels.

In conjunction to this, Authorities have issued warrants on criminal charges against three defendants “Matthew Gatrel, 30, of St. Charles, Illinois, and Juan Martinez, 25, of Pasadena, California, with conspiring to violate the Computer Fraud and Abuse Act through the operation of services known as Downthem and Ampnode.”

David Bukoski, 23, charged for with aiding and abetting computer intrusions and his long running Quantum DDoS services which has 80,000 customer subscriptions was seized.

“DDoS for hire services such as these pose a significant national threat,” said U.S. Attorney Schroder. “Coordinated investigations and prosecutions such as these demonstrate the importance of cross-District collaboration and coordination with public sector partners.”

Recently another DDoS-for-Hire service dubbed “0x-booter” advertised in social media that 0x-booter contains 500 Gbps of Bandwith speed and 20,000 bots. This network speed is more than enough to take down most of the websites.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...