Tuesday, March 4, 2025
HomeDark WebWorld's Biggest DDoS Attack Selling Market Place Finally Taken Down by Operation...

World’s Biggest DDoS Attack Selling Market Place Finally Taken Down by Operation Power OFF

Published on

SIEM as a Service

Follow Us on Google News

Administrators of DDoS-for-hire Service were arrested as a result of a joint Operation Power OFF led by the Dutch police, and UK’s National Crime Agency along with the support of Europol and other law enforcement agencies.

The 6 administrators behind DDoS-for-hire website were located in the United Kingdom, Croatia, Canada, and Serbia. Top users of the marketplace are from Netherlands, Italy, Spain, Croatia, the United Kingdom, Australia, Canada and Hong Kong.

DDoS-for-hire Service 

It is such a service that attackers have a number of remotely connected bots devices to direct a huge traffic to a website or the online platforms.

The DDoS-for-hire Service service provider Webstresser[.]org to be considered as the biggest marketplace for the DDOS and it has over 136,000 registered users and they conducted 4 million attacks.European police confirmed that the illegal service was shut down and its infrastructure was seized.

To make these services available users need to pay a nominal fee through online payment gateways or through cryptocurrencies. Registered users could avail this service as low as EUR 15.00 per month and it allows anyone to launch a DDoS attack even with zero technical skills.

“We have a trend where the sophistication of certain professional hackers to provide resources is allowing individuals – and not just experienced ones – to conduct DDoS attacks and other kinds of malicious activities online”, said Steven Wilson, Head of Europol’s European Cybercrime Centre (EC3).

“International law enforcement will not tolerate these illegal services and will continue to pursue its admins and users. This joint operation is yet another successful example of the ongoing international effort against these destructive cyber attacks” said Jaap van Oss, Dutch Chairman of the Joint Cybercrime Action Taskforce (J-CAT).

Europol said using stresser or booter services for DDoS attack lead to severe penalties such as prison sentence, a fine or both.

“DDoS attacks are illegal. Many IT enthusiasts get involved in seemingly low-level fringe cybercrime activities, unaware of the consequences that such crimes carry” Europol said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has...

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...