Thursday, December 19, 2024
HomeCyber AttackOperation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire...

Operation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire Services

Published on

SIEM as a Service

The Operation Power OFF has taken down the largest illegal market place offering DDoS-for-hire service Webstresser[.]org last April. Authorities collected 151 000 registered users information for the services.

After the services have been taken down, now the authorities tracking down the users enrolled for the DDoS-for-hire service.

Coordinated by Europol along with J-CAT, Dutch police, and British National Crime Agency tracking down the users of this Distributed Denial of Service worldwide.

- Advertisement - SIEM as a Service

It was believed that webstresser[.]org have launched 4 million attacks and the payment starts from € 15.00 a month.

The DoS-for-hire service allows the attackers to have a number of remotely connected bots devices to direct huge traffic to a website or the online platforms.

In the United Kingdom, a number of webstresser[.]org users have recently been visited by the police, who have seized over 60 personal electronic devices and 250 user’s are to be charged for conducting DDoS attacks, reads Europol press release.

In the United Kingdom, a number of webstresser[.]org users have recently been visited by the police, who have seized over 60 personal electronic devices and 250 user’s are to be charged for conducting DDoS attacks, reads Europol press release.

The Netherland police have developed a new project dubbed Hack_Right to deal with the first-time offenders and to prevent them from launching series attacks.

Following are countries join to fight against DDoS attacks that include Belgium, Croatia, Denmark, Estonia, France, Germany, Greece, Hungary, Ireland, Lithuania, Portugal, Romania, Slovenia, Sweden, Australia, Colombia, Serbia, Switzerland, Norway, and the United States.

Last December FBI seized 15 other DDoS-for-hire service websites including the well-known Down them and Quantum Stresser and seized all the evidence and the user information.

“Size does not matter – all levels of users are under the radar of law enforcement, be it a gamer booting out the competition out of a game, or a high-level hacker carrying out DDoS attacks against commercial targets for financial gain.”

The users of DDoS-for-hire Services services are high risk, these Stresser and booter services allow any low-skilled individual to lauch a high impact DDoS attacks by just a click of the button and knock down the websites offline.

Last October a DDoS-for-hire dubbed 0x-booter advertised on Facebook that gives attackers over 500 Gbps of Bandwith speed and 20,000 bots which is enough to down to bring down almost any websites.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...