Tuesday, March 4, 2025
HomeCyber CrimeDDoS-For-Hire Services - 15 Websites Has Been Seized That Offering DDoS Services

DDoS-For-Hire Services – 15 Websites Has Been Seized That Offering DDoS Services

Published on

SIEM as a Service

Follow Us on Google News

DDoS-for-hire services seized by authorities in the United States and seized 15 Internet domains associated with the service.

These sites afford “booter” or “stresser” services that allowed users to launch a powerful DDoS attack against the targeted websites and makes inaccessible over the internet.

According to DOJ press release, “Booter services such as those named in this action allegedly cause attacks on a wide array of victims in the United States and abroad, including financial institutions, universities, internet service providers, government systems, and various gaming platforms.”

The authorities seized following 15 such providers who helped customers to launch a DDoS attack knocking websites and network providers offline.

anonsecurityteam[.]com
booter[.]ninja
bullstresser[.]net
critical-boot[.]com
defcon[.]pro
defianceprotocol[.]com
downthem[.]org
layer7-stresser[.]xyz
netstress[.]org
quantumnstress[.]net
ragebooter[.]com
request[.]rip
str3ssed[.]me
torsecurityteam[.]org
vbooter[.]org

DDoS Attack is one of most dangerous threat for any organization and the attack main aims to exhaust the resources of a network, application or service that leads an organization to face the various technical impacts.

All the services offered to attack infrastructre are tested by FBI and they are available at a very low cost. According to FBI analysis they detemined these services can cause disruptions of networks at all levels.

In conjunction to this, Authorities have issued warrants on criminal charges against three defendants “Matthew Gatrel, 30, of St. Charles, Illinois, and Juan Martinez, 25, of Pasadena, California, with conspiring to violate the Computer Fraud and Abuse Act through the operation of services known as Downthem and Ampnode.”

David Bukoski, 23, charged for with aiding and abetting computer intrusions and his long running Quantum DDoS services which has 80,000 customer subscriptions was seized.

“DDoS for hire services such as these pose a significant national threat,” said U.S. Attorney Schroder. “Coordinated investigations and prosecutions such as these demonstrate the importance of cross-District collaboration and coordination with public sector partners.”

Recently another DDoS-for-Hire service dubbed “0x-booter” advertised in social media that 0x-booter contains 500 Gbps of Bandwith speed and 20,000 bots. This network speed is more than enough to take down most of the websites.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...