FBI Seized 13 Websites that Offered DDoS-for-hire Services

The FBI has been coordinating Operation PowerOFF since 2018, aiming to disrupt the DDoS-for-hire service infrastructures worldwide. 

As part of this Operation, On May 8th, 2023, the FBI seized around 13 internet domains that offered DDos-for-hire services.

The FBI has named them “Booter” services as these services result in “booting” or dropping the victim’s computers from the internet.

The seizure revealed data of hundreds of thousands of DDos-for-hire users responsible for millions of attacks against Schools, universities, financial institutions, and government websites, affecting millions of victims.

10 out of 13 domains seized were found to be a reincarnation of previously seized domains in December when the FBI targeted 48 booter service domains.

An example shown by the Dept of Justice stated that a domain named cyberstress.org was found to be a reincarnation of cyberstress[.]us, seized in December.

The investigation by the FBI

The FBI opened new accounts and renewed old accounts on these DDoS-for-hire service websites for further investigation. They paid for these services in cryptocurrency and launched an attack on FBI test systems.

As advertised by these websites, the services were able to affect the computers on a large scale severing internet connections from the systems and making them completely unavailable.

Additional investigation showed that these services could also disrupt other users’ internet connections if the attackers launched their attack on an internet service provider via a connection point.

Following these investigations, the FBI stated that four defendants arrested in Los Angeles in 2022 admitted to running these booter service operations.

  1. Jeremia Sam Evans Miller aka “John The Dev” from San Antonio, Texas ran the botter service named Royalstresser.com (formerly Supremesecurityteam.com).
  2. Angel Manuel Colon Jr., aka “Anonghost720” and “Anonghost1337,” from Belleview Florida who ran the booter service SecurityTeam.io
  3. Shamar Shattock from Margate, Florida, who ran the booter service “Astrostress.com”
  4. Cory Anthony Palmer, from Lauderhill, Florida, who ran the booter service Booter.sx

All these defendants are scheduled to be sentenced this summer, as mentioned by the Department of Justice.

Furthermore, the FBI has been coordinating this operation with international law enforcement agencies and is aiming to arrest administrators and users of these illegal services.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

6 hours ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

2 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

2 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

2 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

2 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

3 days ago