Monday, October 14, 2024
HomeCyber CrimeDDoS-For-Hire Services - 15 Websites Has Been Seized That Offering DDoS Services

DDoS-For-Hire Services – 15 Websites Has Been Seized That Offering DDoS Services

Published on

Malware protection

DDoS-for-hire services seized by authorities in the United States and seized 15 Internet domains associated with the service.

These sites afford “booter” or “stresser” services that allowed users to launch a powerful DDoS attack against the targeted websites and makes inaccessible over the internet.

According to DOJ press release, “Booter services such as those named in this action allegedly cause attacks on a wide array of victims in the United States and abroad, including financial institutions, universities, internet service providers, government systems, and various gaming platforms.”

- Advertisement - SIEM as a Service

The authorities seized following 15 such providers who helped customers to launch a DDoS attack knocking websites and network providers offline.

anonsecurityteam[.]com
booter[.]ninja
bullstresser[.]net
critical-boot[.]com
defcon[.]pro
defianceprotocol[.]com
downthem[.]org
layer7-stresser[.]xyz
netstress[.]org
quantumnstress[.]net
ragebooter[.]com
request[.]rip
str3ssed[.]me
torsecurityteam[.]org
vbooter[.]org

DDoS Attack is one of most dangerous threat for any organization and the attack main aims to exhaust the resources of a network, application or service that leads an organization to face the various technical impacts.

All the services offered to attack infrastructre are tested by FBI and they are available at a very low cost. According to FBI analysis they detemined these services can cause disruptions of networks at all levels.

In conjunction to this, Authorities have issued warrants on criminal charges against three defendants “Matthew Gatrel, 30, of St. Charles, Illinois, and Juan Martinez, 25, of Pasadena, California, with conspiring to violate the Computer Fraud and Abuse Act through the operation of services known as Downthem and Ampnode.”

David Bukoski, 23, charged for with aiding and abetting computer intrusions and his long running Quantum DDoS services which has 80,000 customer subscriptions was seized.

“DDoS for hire services such as these pose a significant national threat,” said U.S. Attorney Schroder. “Coordinated investigations and prosecutions such as these demonstrate the importance of cross-District collaboration and coordination with public sector partners.”

Recently another DDoS-for-Hire service dubbed “0x-booter” advertised in social media that 0x-booter contains 500 Gbps of Bandwith speed and 20,000 bots. This network speed is more than enough to take down most of the websites.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...