Tuesday, November 12, 2024
Homecyber securityNCA Shut’s Down the Most Popular “digitalstress” DDoS-for-hire Service

NCA Shut’s Down the Most Popular “digitalstress” DDoS-for-hire Service

Published on

Malware protection

The National Crime Agency (NCA) has successfully infiltrated and dismantled one of the most notorious Distributed Denial of Service (DDoS) for hire services, digitalstress.su.

This criminal marketplace, responsible for tens of thousands of attacks weekly worldwide, was taken down through a collaborative effort between the NCA and the Police Service of Northern Ireland (PSNI).

Earlier this month, the PSNI arrested one of the site’s suspected controllers, paving the way for the NCA to take over the site and disable its functionality.

- Advertisement - SIEM as a Service

Innovative Tactics and International Cooperation

The NCA’s innovative approach involved creating a mirror site that redirected users to a splash page, warning them that law enforcement had collected their data.

This strategic move not only disabled the site but also sent a clear message to cybercriminals that their activities were being closely monitored.

The splash page displayed a stern warning: On 2 July, a joint operation by the NCA, PSNI, and FBI led to the arrest of a suspected controller of DigitalStress. We have now taken down www.digitalstress.su. We are watching you.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Is it worth it? The NCA also accessed communication platforms used to discuss launching DDoS attacks, further demonstrating that no platform is safe for cybercriminals to discuss their illicit activities.

This operation follows an FBI-led international effort in December 2022, which targeted tools and services for severe cyberattacks and resulted in the takedown of 48 of the world’s most famous ‘booter’ sites.

Impact and Future Implications

DDoS-for-hire services, such as digitalstress.su, allow users to create accounts and order DDoS attacks within minutes, posing significant threats to businesses, critical national infrastructure, and essential public services.

The administrators of digitalstress.su believed using an old Soviet Union domain (.su) would shield them from law enforcement. However, the NCA’s successful takedown has proven that such domains are not beyond reach.

Deputy Director Paul Foster, head of the NCA’s National Cyber Crime Unit, emphasized the importance of innovative tools and techniques in combating cybercrime.

“Booter services are an attractive entry-level cyber crime, allowing individuals with little technical ability to easily commit cyber offenses. Anyone using these services while our mirror site was in place has now made themselves known to law enforcement agencies worldwide,” he stated.

Detective Chief Inspector Paul Woods of the PSNI highlighted the importance of collaborative efforts in tackling cybercrime.

“This is an excellent example of collaborative working. We will continue to work tirelessly alongside our law enforcement partners to disrupt the activities of those who use cyber technology to cause damage, whether locally or globally,” he said.

This operation forms part of Operation Power Off, an ongoing coordinated international response targeting criminal DDoS-for-hire infrastructures worldwide.

The NCA’s actions have sent a strong message to cybercriminals: anonymity and impunity are no longer guaranteed.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware Workstation & Fusion Now Available for Free to All Users

VMware has announced that its popular desktop hypervisor products, VMware Workstation and VMware Fusion,...

Dell Enterprise SONiC Flaw Let Attackers Hijack the System

Dell Technologies has disclosed multiple critical security vulnerabilities in its Enterprise SONiC OS, which...

Amazon Confirms Employee Data Breach Via Third-party Vendor

Amazon has confirmed that sensitive employee data was exposed due to a breach at...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

VMware Workstation & Fusion Now Available for Free to All Users

VMware has announced that its popular desktop hypervisor products, VMware Workstation and VMware Fusion,...

Dell Enterprise SONiC Flaw Let Attackers Hijack the System

Dell Technologies has disclosed multiple critical security vulnerabilities in its Enterprise SONiC OS, which...

Amazon Confirms Employee Data Breach Via Third-party Vendor

Amazon has confirmed that sensitive employee data was exposed due to a breach at...