Owners of the DDoS-on-Order service, working since 2013, were arrested in Poland

✨ Megiddo

✨ President ✨
Staff member
Joined
May 15, 2016
Messages
13,989
Likes
2,643
Points
1,730
During the searches, the earnings of intruders and the activity of users of the service were revealed.

Polish police arrested two people who are accused of involvement in the creation and operation of the DDoS-attack service ( DDoS-for-hire ), also known as « letter » ( booter ) or « stresser » (, valid since 2013.

Arrests are part of a coordinated international law enforcement operation « Operation PowerOFF », aimed at suppressing the activities of online platforms that allow anyone to launch a mass DDoS attack against any target for a fee.

The operation was attended by Europol, the FBI and law enforcement agencies of the Netherlands, Germany and Belgium under the leadership of the Joint Cybercrime Group ( J-CAT ).

Employees of the Central Bureau for Combating Cybercrime of Poland ( CBZC ) detained two suspects and conducted 10 searches, during which they collected valuable data from a server of intruders located in Switzerland.

Evidence obtained from the servers of the suspects revealed the following information:
more than 35,000 user accounts;
more than 76,000 login entries;
more than 320,000 unique IP addresses associated with the DDoS attack service;
11,000 records of purchased plans indicating the email addresses of buyers who paid in total about $ 400,000;
more than 1000 records of other tariffs worth about $ 44,000.
The Polish police also found convincing evidence of the management and administration of the criminal domain on the computer of one of the suspects.

Operation PowerOFF — is a long-term international law enforcement operation that has led to the closure of dozens of other major DDoS-attack platforms. As far back as December 2022, the FBI seized 49 domains of booter services, while 10 previously suppressed platforms registered new domains allowing them to stay online.

And in March, the UK National Crime Agency ( NCA ) created several fake sites « DDoS attacks to order » ( DDoS-for-hire ) to identify cybercriminals, who use these services to attack organizations.Several thousand people got access to fake sites that looked like a real DDoS-for-hire service. However, instead of providing access to DDoS tools, sites simply collected information about visitors.
__________________
 
Top Bottom