Friday, May 2, 2025
HomeCyber AttackAuthorities Taken Down WeLeakInfo and other Domains Providing DDoS Service

Authorities Taken Down WeLeakInfo and other Domains Providing DDoS Service

Published on

SIEM as a Service

Follow Us on Google News

In a recent announcement by the U.S. Department of Justice (DoJ) and the FBI, three domains were seized. It is believed that these domains are being utilized by cybercriminals to sell stolen personal information or to provide DDoS attack services in connection with data breaches.

The seizure is the result of an investigation carried out by U.S. authorities into the sale and purchase of illicit services via websites and domains.

Domains Seized

The seizure includes the following three domains:-

- Advertisement - Google News
  • weleakinfo[.]to
  • ipstress[.]in
  • ovh-booter[.]com

After a joint operation, all these above-mentioned domains were seized. And this operation was jointly coordinated with the following agencies:-

  • National Police Corps of the Netherlands.
  • The Federal Police of Belgium

Apart from this, as a result of this action, a suspect was arrested, server infrastructure was seized, and a number of locations were searched.

Data Available for Trading

There was a website called WeLeakInfo[.]to sell subscriptions that allowed users to search for data stolen in over 10,000 data breach incidents. An estimated 7 billion records contained a variety of personally identifiable information (PII):-

  • Names
  • Email
  • Usernames
  • Phone numbers
  • Passwords

Moreover, the threat actors also used another two domains for the provision of booter services or stressor services, respectively.

Clients can ask for these types of services to be performed in order to have a website or web platform that they think might be vulnerable to large-scale DDoS attacks taken down.

Here’s what FBI Special Agent in Charge, Wayne A. Jacobs, stated:-

“These seizures are prime examples of the ongoing actions the FBI and our international partners are undertaking to disrupt malicious cyber activity. Disrupting malicious DDoS operations and dismantling websites that facilitate the theft and sale of stolen personal information is a priority for the FBI.”

Furthermore, the federal agencies have issued an advisory stating that anybody who has a theoretical knowledge of these portals and their operators should immediately report to the FBI.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...

Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands

A major supply chain security incident has rocked the Python open-source community as researchers...

CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued two new advisories revealing critical...

NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code

NVIDIA has issued an urgent security advisory after discovering a significant vulnerability (CVE-2025-23254) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...

Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands

A major supply chain security incident has rocked the Python open-source community as researchers...

CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued two new advisories revealing critical...