Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
Briefly

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
""Booter services allow users to launch DDoS attacks against targeted websites, servers, or networks. Their infrastructure is made up of servers, databases, and other technical components that make DDoS-for-hire activities possible. By seizing these infrastructures, authorities were able to hinder these criminal operations and prevent further damage to victims.""
""DDoS-for-hire is one of the most prolific and easily accessible trends in cybercrime, as it allows even individuals with little to no technical knowledge to execute malicious attacks at scale and inflict significant damage to businesses.""
""DDoS activity can originate from well-resourced and skilled threat actors, who could rely on such services to customize or optimize their illicit activities. DDoS attacks often tend to target various web-based services, with motivations ranging from simple curiosity and financial gain to hacktivism and disruption of competitors' services.""
Operation PowerOFF successfully dismantled 53 domains associated with DDoS-for-hire services, arresting four individuals. The operation involved 21 countries and disrupted access to these services, affecting over 75,000 cybercriminals. Authorities seized technical infrastructure and accessed databases with over 3 million criminal user accounts. Warning emails were sent to identified users, and 25 search warrants were issued. DDoS-for-hire services are easily accessible, allowing individuals with minimal technical skills to launch attacks for various motivations, including financial gain and ideological reasons.
Read at The Hacker News
Unable to calculate read time
[
|
]