Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police

The UK’s National Crime Agency has been running several DDoS-for-hire websites to collect information about individuals looking to launch such attacks.

The UK’s National Crime Agency (NCA) has been running several fake DDoS-for-hire websites in an effort to infiltrate the cybercrime marketplace and collect information on individuals engaging in these types of activities.

The law enforcement agency has set up an unspecified number of websites that claim to allow users to launch distributed denial-of-service (DDoS) attacks against a specified target. 

These types of services, also known as ‘booter’ or ‘stresser’ services, have posed a significant problem to many organizations around the world, as they allow individuals with limited skills and financial resources to launch highly disruptive attacks. 

The fake DDoS-for-hire websites run by the NCA were set up as part of an international law enforcement operation named ‘Power Off’. Last year, the same operation resulted in the seizure of 46 internet domains associated with booter services. 

The NCA recently decided to replace the homepage of one of its fake websites with a page informing visitors that their information has been collected and that they should expect to be contacted by law enforcement.

Fake DDoS for hire website

“All of the NCA-run sites, which have so far been accessed by around several thousand people, have been created to look like they offer the tools and services that enable cyber criminals to execute these attacks,” the agency said. “However, after users register, rather than being given access to cyber crime tools, their data is collated by investigators.”

The identified users of the fake DDoS-for-hire websites who are located in the UK will be contacted by the NCA or police and warned about the consequences of their actions. Information about users in other countries will be passed on to their respective law enforcement agencies. 

Advertisement. Scroll to continue reading.

Given that minimal technical skills are required to launch DDoS attacks through booter services, it’s likely that many of the users of these websites don’t have the knowledge to hide their true identity from a well-resourced law enforcement agency. 

Related: US Authorities Seize Domains Selling Stolen Data, DDoS Services

Related: DDoS-for-Hire Service Admin Gets 13 Months in Prison

Related: Man Sentenced to 5 Years in Prison for DDoS Attacks

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.