Cyber Security News

Europol Shutsdown 27 DDoS Service Provider Platforms

In a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15 countries, has taken down 27 illegal platforms facilitating Distributed Denial-of-Service (DDoS) attacks.

This takedown marks a significant blow to the cybercrime industry, disrupting one of the most common tools cybercriminals use to cause widespread disruption.

These platforms, known as ‘booter’ and ‘stresser’ websites, allowed users to launch DDoS attacks that overwhelm targeted websites and online services with massive traffic, rendering them inaccessible.

Europol’s coordinated efforts led to the arrest of three administrators responsible for running these platforms, while over 300 service users have been identified for further investigation.

Authorities targeted popular platforms such as zdstresser.net, orbitalstress.net, and starkstresser.net, which had been widely used by hackers and hacktivist groups.

The operation comes at a critical time, as the festive season is often exploited by cybercriminals to launch high-profile attacks.

These could range from financial sabotage to ideological campaigns orchestrated by groups like Killnet or Anonymous Sudan.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Global Collaboration and Investigative Expertise

Europol’s European Cybercrime Centre (EC3) played a pivotal role in coordinating this operation, facilitating technical sprints, and developing key investigative leads.

The Joint Cybercrime Action Taskforce (J-CAT), based at Europol’s headquarters, provided crucial analytical and forensic support, including advanced crypto-tracing techniques.

Participating countries included the United States, United Kingdom, Australia, Germany, Japan, and more, with each contributing resources to dismantle these criminal networks. Arrests were made in France and Germany, showcasing the international reach of the operation.

Beyond dismantling existing platforms, Operation PowerOFF aims to deter future offenders. A targeted online ad campaign will educate potential perpetrators, particularly young people, about the risks and legal consequences of engaging in DDoS-for-hire schemes.

Tailored messages will appear on Google and YouTube, where individuals often search for or learn about these illegal tools.

Additionally, law enforcement agencies will issue over 250 warning letters and 2,000 emails to users of these services, reinforcing the message that DDoS attacks are criminal acts with serious consequences.

Operation PowerOFF underscores the global commitment to combating cybercrime at all levels. By combining enforcement actions with deterrence campaigns, Europol and its international partners are making strides in protecting digital infrastructure and educating the public.

As this operation continues, it serves as a warning to cybercriminals: the era of operating with impunity is coming to an end.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE

Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has…

16 minutes ago

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed,…

23 minutes ago

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according…

2 hours ago

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could…

2 hours ago

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as OilRig,…

2 hours ago

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with…

3 hours ago