News

US Authorities Closed 13 Sites for Ordering DDoS Attacks

The US Department of Justice announced the closure of 13 sites associated with platforms for cybercriminals to organize DDoS attacks on demand.

The seizure became part of a large-scale international operation called PowerOFF, in which law enforcement officers are fighting DDoS infrastructures around the world.

We also wrote that The number of ransomware DDoS attacks has dropped significantly, and also that Cloudflare Recorded the Most Powerful DDoS Attack in the History of Observations.

And also the media wrote that Russian Hackers Use Passion DDoS Platform to Attack Medical Facilities.

The US Department of Justice reports that it has carried out a third wave of actions against the so-called “booters” and “stressers“. If a booter is a service that allows attackers to order a DDoS attack on any site or device connected to the Internet, then a stresser offers the same functionality, but supposedly is designed to legitimately test the reliability of web services and the servers behind them.

Let me remind you that last year, American law enforcement officers immediately closed 48 sites that were used to organize DDoS attacks around the world.

10 of the 13 domains seized today are reincarnations of services that were closed during the previous sweep in December 2022, which targeted the top 48 buter services. For example, one of the domains taken this week, Cyberstress.org, appears to be the same service running on the Cyberstress.us domain that was taken in December.according to the US Department of Justice.

The full list of domains confiscated by law enforcement officers can be seen in the table below.

Before the takeover, the FBI tested all the services, opening or renewing accounts on each, and assessing the impact of DDoS attacks on targeted computers, according to the released affidavit. These tests have helped validate the effectiveness of the booters, with the FBI saying some of the attacks took targeted devices offline.


One of the FBI tests

The Justice Department also said that four suspects who were indicted last year (one Texan, three Florida residents, another from New York and another from Hawaii) have already pleaded guilty. These individuals are believed to have operated various DDoS attack sites, including RoyalStresser.com, SecurityTeam.io, Astrostress.com, Booter.sx, Ipstressor.com and TrueSecurityServices.io.
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Pbmsoultions pop-up ads (Virus Removal Guide)

Pbmsoultions.com is a domain that tries to trick you into clik to its browser notifications…

12 hours ago

Remove Prizestash pop-up ads (Virus Removal Guide)

Prizestash.com is a site that tries to trick you into subscribing to its browser notifications…

12 hours ago

Remove Verifiedbreaking pop-up ads (Virus Removal Guide)

Verifiedbreaking.com is a domain that tries to force you into subscribing to its browser notifications…

12 hours ago

Remove Themoneyminutes pop-up ads (Virus Removal Guide)

Themoneyminutes.com is a domain that tries to force you into subscribing to its browser notifications…

13 hours ago

Remove News-xcidizi pop-up ads (Virus Removal Guide)

News-xcidizi.com is a domain that tries to trick you into clik to its browser notifications…

16 hours ago

Remove Everytraffic-flow pop-up ads (Virus Removal Guide)

Everytraffic-flow.com is a domain that tries to trick you into subscribing to its browser notifications…

16 hours ago