Tuesday, March 4, 2025
HomeCyber AttackOperation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire...

Operation Power OFF -Authorities Tracking Down the largest Market place offering DDoS-for-hire Services

Published on

SIEM as a Service

Follow Us on Google News

The Operation Power OFF has taken down the largest illegal market place offering DDoS-for-hire service Webstresser[.]org last April. Authorities collected 151 000 registered users information for the services.

After the services have been taken down, now the authorities tracking down the users enrolled for the DDoS-for-hire service.

Coordinated by Europol along with J-CAT, Dutch police, and British National Crime Agency tracking down the users of this Distributed Denial of Service worldwide.

It was believed that webstresser[.]org have launched 4 million attacks and the payment starts from € 15.00 a month.

The DoS-for-hire service allows the attackers to have a number of remotely connected bots devices to direct huge traffic to a website or the online platforms.

In the United Kingdom, a number of webstresser[.]org users have recently been visited by the police, who have seized over 60 personal electronic devices and 250 user’s are to be charged for conducting DDoS attacks, reads Europol press release.

In the United Kingdom, a number of webstresser[.]org users have recently been visited by the police, who have seized over 60 personal electronic devices and 250 user’s are to be charged for conducting DDoS attacks, reads Europol press release.

The Netherland police have developed a new project dubbed Hack_Right to deal with the first-time offenders and to prevent them from launching series attacks.

Following are countries join to fight against DDoS attacks that include Belgium, Croatia, Denmark, Estonia, France, Germany, Greece, Hungary, Ireland, Lithuania, Portugal, Romania, Slovenia, Sweden, Australia, Colombia, Serbia, Switzerland, Norway, and the United States.

Last December FBI seized 15 other DDoS-for-hire service websites including the well-known Down them and Quantum Stresser and seized all the evidence and the user information.

“Size does not matter – all levels of users are under the radar of law enforcement, be it a gamer booting out the competition out of a game, or a high-level hacker carrying out DDoS attacks against commercial targets for financial gain.”

The users of DDoS-for-hire Services services are high risk, these Stresser and booter services allow any low-skilled individual to lauch a high impact DDoS attacks by just a click of the button and knock down the websites offline.

Last October a DDoS-for-hire dubbed 0x-booter advertised on Facebook that gives attackers over 500 Gbps of Bandwith speed and 20,000 bots which is enough to down to bring down almost any websites.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...