Cybercrime

US Seizes Domains of 13 DDoS-for-Hire Services

US authorities have seized 13 internet domains associated with DDoS-for-hire services.

US authorities have seized 13 internet domains associated with DDoS-for-hire services.

US authorities this week announced that they seized 13 internet domains associated with DDoS attack services.

These DDoS-for-hire services allow users to launch powerful attacks that flood targeted devices with internet traffic to slow them down or prevent them from accessing the web.

The newly announced court-authorized seizure is the third wave of actions that US law enforcement has taken against DDoS-for-hire services, which are also known as ‘booter’ or ‘stresser’ services.

Data gathered from previous actions has shown that hundreds of thousands of registered users were using these services to launch DDoS attacks against financial institutions, government websites, school districts, universities, and other types of victims.

Of the 13 domains seized this week, 10 were reincarnations of services that US authorities seized in December 2022, in an operation that targeted 48 DDoS-for-hire services.

For example, one of the services disrupted in December, when it used the domain cyberstress.us, apparently reemerged on the website cyberstress.org, which was seized this week.

As part of its investigation into the domains, the Federal Bureau of Investigation opened or renewed accounts with each service and then tested them by launching DDoS attacks against computers controlled by the FBI.

The booter services, the authorities say, were operating as advertised, in some cases completely severing the internet connection despite the network’s large capacity.

Advertisement. Scroll to continue reading.

In addition to the seizure, the US this week announced that four individuals charged in late 2022 in relation to DDoS booter services pleaded guilty earlier this year and are scheduled for sentencing this summer.

The defendants are Jeremiah Sam Evans Miller, 23, of San Antonio, Texas, who admitted to operating RoyalStresser.com; Angel Manuel Colon Jr., 37, of Belleview, Florida, who operated SecurityTeam.io; Shamar Shattock, 19, of Margate, Florida, who operated Astrostress.com; and Cory Anthony Palmer, 23, of Lauderhill, Florida, who operated Booter.sx.

The newly announced seizures are part of an ongoing international law enforcement effort named Operation PowerOFF, which aims to dismantle criminal DDoS-for-hire services worldwide.

Related: Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police

Related: Record-Breaking 71 Million RPS DDoS Attack Seen by Cloudflare

Related: Pro-Russian Group DDoS-ing Governments, Critical Infrastructure in Ukraine, NATO Countries

Related Content

Cybercrime

LabHost, a major phishing-as-a-service platform, has been shut down as part of a major law enforcement operation. 

Cloud Security

SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks.

Network Security

New HTTP/2 DoS method named Continuation Flood can pose a greater risk than Rapid Reset, which has been used for record-breaking attacks.

Network Security

CISA, the FBI, and MS-ISAC have released new guidance on how federal agencies can defend against DDoS attacks.

Cybercrime

A group of hackers called Anonymous Sudan, considered by cybersecurity experts as pro-Russia, claimed responsibility for the attacks in online posts.

Cybercrime

With over 180,000 users, Crimemarket was a trading hub for narcotics, cybercrime tools, and crimeware guides.

Ransomware

The LockBit ransomware operation has been severely disrupted by an international law enforcement operation resulting in server seizures and arrests.

Cybercrime

DDoS attacks have evolved from social protests through criminal extortion, hack attack smokescreens and competitor suppression to geopolitical vengeance.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version