Friday, March 21, 2025
Homecyber securityNCA Shut’s Down the Most Popular “digitalstress” DDoS-for-hire Service

NCA Shut’s Down the Most Popular “digitalstress” DDoS-for-hire Service

Published on

SIEM as a Service

Follow Us on Google News

The National Crime Agency (NCA) has successfully infiltrated and dismantled one of the most notorious Distributed Denial of Service (DDoS) for hire services, digitalstress.su.

This criminal marketplace, responsible for tens of thousands of attacks weekly worldwide, was taken down through a collaborative effort between the NCA and the Police Service of Northern Ireland (PSNI).

Earlier this month, the PSNI arrested one of the site’s suspected controllers, paving the way for the NCA to take over the site and disable its functionality.

Innovative Tactics and International Cooperation

The NCA’s innovative approach involved creating a mirror site that redirected users to a splash page, warning them that law enforcement had collected their data.

This strategic move not only disabled the site but also sent a clear message to cybercriminals that their activities were being closely monitored.

The splash page displayed a stern warning: On 2 July, a joint operation by the NCA, PSNI, and FBI led to the arrest of a suspected controller of DigitalStress. We have now taken down www.digitalstress.su. We are watching you.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Is it worth it? The NCA also accessed communication platforms used to discuss launching DDoS attacks, further demonstrating that no platform is safe for cybercriminals to discuss their illicit activities.

This operation follows an FBI-led international effort in December 2022, which targeted tools and services for severe cyberattacks and resulted in the takedown of 48 of the world’s most famous ‘booter’ sites.

Impact and Future Implications

DDoS-for-hire services, such as digitalstress.su, allow users to create accounts and order DDoS attacks within minutes, posing significant threats to businesses, critical national infrastructure, and essential public services.

The administrators of digitalstress.su believed using an old Soviet Union domain (.su) would shield them from law enforcement. However, the NCA’s successful takedown has proven that such domains are not beyond reach.

Deputy Director Paul Foster, head of the NCA’s National Cyber Crime Unit, emphasized the importance of innovative tools and techniques in combating cybercrime.

“Booter services are an attractive entry-level cyber crime, allowing individuals with little technical ability to easily commit cyber offenses. Anyone using these services while our mirror site was in place has now made themselves known to law enforcement agencies worldwide,” he stated.

Detective Chief Inspector Paul Woods of the PSNI highlighted the importance of collaborative efforts in tackling cybercrime.

“This is an excellent example of collaborative working. We will continue to work tirelessly alongside our law enforcement partners to disrupt the activities of those who use cyber technology to cause damage, whether locally or globally,” he said.

This operation forms part of Operation Power Off, an ongoing coordinated international response targeting criminal DDoS-for-hire infrastructures worldwide.

The NCA’s actions have sent a strong message to cybercriminals: anonymity and impunity are no longer guaranteed.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government...

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through...

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan,...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government...

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through...

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan,...