NCA Shut’s Down the Most Popular “digitalstress” DDoS-for-hire Service

The National Crime Agency (NCA) has successfully infiltrated and dismantled one of the most notorious Distributed Denial of Service (DDoS) for hire services, digitalstress.su.

This criminal marketplace, responsible for tens of thousands of attacks weekly worldwide, was taken down through a collaborative effort between the NCA and the Police Service of Northern Ireland (PSNI).

Earlier this month, the PSNI arrested one of the site’s suspected controllers, paving the way for the NCA to take over the site and disable its functionality.

Innovative Tactics and International Cooperation

The NCA’s innovative approach involved creating a mirror site that redirected users to a splash page, warning them that law enforcement had collected their data.

This strategic move not only disabled the site but also sent a clear message to cybercriminals that their activities were being closely monitored.

The splash page displayed a stern warning: On 2 July, a joint operation by the NCA, PSNI, and FBI led to the arrest of a suspected controller of DigitalStress. We have now taken down www.digitalstress.su. We are watching you.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Is it worth it? The NCA also accessed communication platforms used to discuss launching DDoS attacks, further demonstrating that no platform is safe for cybercriminals to discuss their illicit activities.

This operation follows an FBI-led international effort in December 2022, which targeted tools and services for severe cyberattacks and resulted in the takedown of 48 of the world’s most famous ‘booter’ sites.

Impact and Future Implications

DDoS-for-hire services, such as digitalstress.su, allow users to create accounts and order DDoS attacks within minutes, posing significant threats to businesses, critical national infrastructure, and essential public services.

The administrators of digitalstress.su believed using an old Soviet Union domain (.su) would shield them from law enforcement. However, the NCA’s successful takedown has proven that such domains are not beyond reach.

Deputy Director Paul Foster, head of the NCA’s National Cyber Crime Unit, emphasized the importance of innovative tools and techniques in combating cybercrime.

“Booter services are an attractive entry-level cyber crime, allowing individuals with little technical ability to easily commit cyber offenses. Anyone using these services while our mirror site was in place has now made themselves known to law enforcement agencies worldwide,” he stated.

Detective Chief Inspector Paul Woods of the PSNI highlighted the importance of collaborative efforts in tackling cybercrime.

“This is an excellent example of collaborative working. We will continue to work tirelessly alongside our law enforcement partners to disrupt the activities of those who use cyber technology to cause damage, whether locally or globally,” he said.

This operation forms part of Operation Power Off, an ongoing coordinated international response targeting criminal DDoS-for-hire infrastructures worldwide.

The NCA’s actions have sent a strong message to cybercriminals: anonymity and impunity are no longer guaranteed.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

4 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

4 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

7 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

10 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

11 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

12 hours ago