Saturday, March 2, 2024

FBI Seized 13 Websites that Offered DDoS-for-hire Services

The FBI has been coordinating Operation PowerOFF since 2018, aiming to disrupt the DDoS-for-hire service infrastructures worldwide. 

As part of this Operation, On May 8th, 2023, the FBI seized around 13 internet domains that offered DDos-for-hire services.

The FBI has named them “Booter” services as these services result in “booting” or dropping the victim’s computers from the internet.

The seizure revealed data of hundreds of thousands of DDos-for-hire users responsible for millions of attacks against Schools, universities, financial institutions, and government websites, affecting millions of victims.

10 out of 13 domains seized were found to be a reincarnation of previously seized domains in December when the FBI targeted 48 booter service domains.

An example shown by the Dept of Justice stated that a domain named cyberstress.org was found to be a reincarnation of cyberstress[.]us, seized in December.

The investigation by the FBI

The FBI opened new accounts and renewed old accounts on these DDoS-for-hire service websites for further investigation. They paid for these services in cryptocurrency and launched an attack on FBI test systems.

As advertised by these websites, the services were able to affect the computers on a large scale severing internet connections from the systems and making them completely unavailable.

Additional investigation showed that these services could also disrupt other users’ internet connections if the attackers launched their attack on an internet service provider via a connection point.

Following these investigations, the FBI stated that four defendants arrested in Los Angeles in 2022 admitted to running these booter service operations.

  1. Jeremia Sam Evans Miller aka “John The Dev” from San Antonio, Texas ran the botter service named Royalstresser.com (formerly Supremesecurityteam.com).
  2. Angel Manuel Colon Jr., aka “Anonghost720” and “Anonghost1337,” from Belleview Florida who ran the booter service SecurityTeam.io
  3. Shamar Shattock from Margate, Florida, who ran the booter service “Astrostress.com”
  4. Cory Anthony Palmer, from Lauderhill, Florida, who ran the booter service Booter.sx

All these defendants are scheduled to be sentenced this summer, as mentioned by the Department of Justice.

Furthermore, the FBI has been coordinating this operation with international law enforcement agencies and is aiming to arrest administrators and users of these illegal services.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Website

Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles