Wednesday, February 12, 2025
HomeCyber Security NewsEuropol Shutsdown 27 DDoS Service Provider Platforms

Europol Shutsdown 27 DDoS Service Provider Platforms

Published on

SIEM as a Service

Follow Us on Google News

In a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15 countries, has taken down 27 illegal platforms facilitating Distributed Denial-of-Service (DDoS) attacks.

This takedown marks a significant blow to the cybercrime industry, disrupting one of the most common tools cybercriminals use to cause widespread disruption.

These platforms, known as ‘booter’ and ‘stresser’ websites, allowed users to launch DDoS attacks that overwhelm targeted websites and online services with massive traffic, rendering them inaccessible.

Europol’s coordinated efforts led to the arrest of three administrators responsible for running these platforms, while over 300 service users have been identified for further investigation.

Authorities targeted popular platforms such as zdstresser.net, orbitalstress.net, and starkstresser.net, which had been widely used by hackers and hacktivist groups.

The operation comes at a critical time, as the festive season is often exploited by cybercriminals to launch high-profile attacks.

These could range from financial sabotage to ideological campaigns orchestrated by groups like Killnet or Anonymous Sudan.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Global Collaboration and Investigative Expertise

Europol’s European Cybercrime Centre (EC3) played a pivotal role in coordinating this operation, facilitating technical sprints, and developing key investigative leads.

The Joint Cybercrime Action Taskforce (J-CAT), based at Europol’s headquarters, provided crucial analytical and forensic support, including advanced crypto-tracing techniques.

Participating countries included the United States, United Kingdom, Australia, Germany, Japan, and more, with each contributing resources to dismantle these criminal networks. Arrests were made in France and Germany, showcasing the international reach of the operation.

Beyond dismantling existing platforms, Operation PowerOFF aims to deter future offenders. A targeted online ad campaign will educate potential perpetrators, particularly young people, about the risks and legal consequences of engaging in DDoS-for-hire schemes.

Tailored messages will appear on Google and YouTube, where individuals often search for or learn about these illegal tools.

Additionally, law enforcement agencies will issue over 250 warning letters and 2,000 emails to users of these services, reinforcing the message that DDoS attacks are criminal acts with serious consequences.

Operation PowerOFF underscores the global commitment to combating cybercrime at all levels. By combining enforcement actions with deterrence campaigns, Europol and its international partners are making strides in protecting digital infrastructure and educating the public.

As this operation continues, it serves as a warning to cybercriminals: the era of operating with impunity is coming to an end.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing...

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing...