Friday, March 7, 2025
HomeCyber Security NewsEuropol Shutsdown 27 DDoS Service Provider Platforms

Europol Shutsdown 27 DDoS Service Provider Platforms

Published on

SIEM as a Service

Follow Us on Google News

In a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15 countries, has taken down 27 illegal platforms facilitating Distributed Denial-of-Service (DDoS) attacks.

This takedown marks a significant blow to the cybercrime industry, disrupting one of the most common tools cybercriminals use to cause widespread disruption.

These platforms, known as ‘booter’ and ‘stresser’ websites, allowed users to launch DDoS attacks that overwhelm targeted websites and online services with massive traffic, rendering them inaccessible.

Europol’s coordinated efforts led to the arrest of three administrators responsible for running these platforms, while over 300 service users have been identified for further investigation.

Authorities targeted popular platforms such as zdstresser.net, orbitalstress.net, and starkstresser.net, which had been widely used by hackers and hacktivist groups.

The operation comes at a critical time, as the festive season is often exploited by cybercriminals to launch high-profile attacks.

These could range from financial sabotage to ideological campaigns orchestrated by groups like Killnet or Anonymous Sudan.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Global Collaboration and Investigative Expertise

Europol’s European Cybercrime Centre (EC3) played a pivotal role in coordinating this operation, facilitating technical sprints, and developing key investigative leads.

The Joint Cybercrime Action Taskforce (J-CAT), based at Europol’s headquarters, provided crucial analytical and forensic support, including advanced crypto-tracing techniques.

Participating countries included the United States, United Kingdom, Australia, Germany, Japan, and more, with each contributing resources to dismantle these criminal networks. Arrests were made in France and Germany, showcasing the international reach of the operation.

Beyond dismantling existing platforms, Operation PowerOFF aims to deter future offenders. A targeted online ad campaign will educate potential perpetrators, particularly young people, about the risks and legal consequences of engaging in DDoS-for-hire schemes.

Tailored messages will appear on Google and YouTube, where individuals often search for or learn about these illegal tools.

Additionally, law enforcement agencies will issue over 250 warning letters and 2,000 emails to users of these services, reinforcing the message that DDoS attacks are criminal acts with serious consequences.

Operation PowerOFF underscores the global commitment to combating cybercrime at all levels. By combining enforcement actions with deterrence campaigns, Europol and its international partners are making strides in protecting digital infrastructure and educating the public.

As this operation continues, it serves as a warning to cybercriminals: the era of operating with impunity is coming to an end.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...