Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
5 résultats taggé DDoS-for-hire  ✕
DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains | Europol https://www.europol.europa.eu/media-press/newsroom/news/ddos-for-hire-empire-brought-down-poland-arrests-4-administrators-us-seizes-9-domains
07/05/2025 14:26:52
QRCode
archive.org
thumbnail

In the latest blow to the criminal market for distributed denial of service (DDoS)-for-hire services, Polish authorities have arrested four individuals who allegedly ran a network of platforms used to launch thousands of cyberattacks worldwide. The suspects are believed to be behind six separate stresser/booter services that enabled paying customers to flood websites and servers with malicious traffic — knocking them offline for as little as EUR 10.

The now defunct platforms – Cfxapi, Cfxsecurity, neostress, jetstress, quickdown and zapcut – are thought to have facilitated widespread attacks on schools, government services, businesses, and gaming platforms between 2022 and 2025.

The platforms offered slick interfaces that required no technical skills. Users simply entered a target IP address, selected the type and duration of attack, and paid the fee — automating attacks that could overwhelm even well-defended websites.

Global law enforcement response
The arrests in Poland were part of a coordinated international action involving law enforcement authorities in 4 countries, with Europol providing analytical and operational support throughout the investigation.

Dutch authorities have deployed fake booter sites designed to warn users seeking out DDoS-for-hire services, reinforcing the message that those who use these tools are being watched and could face prosecution. Data from booter websites, seized by Dutch law enforcement in data centres in the Netherlands, was shared with international partners, including Poland, contributing to the arrest of the four administrators.

The United States seized 9 domains associated with booter services during the coordinated week of action, continuing its broader campaign against commercialised DDoS platforms.

Germany supported the Polish-led investigation by helping identify one of the suspects and sharing critical intelligence on others.

europol EN 2025 DDoS-for-hire arrested busted law enforcement response PowerOFF
NCA infiltrates world's most prolific DDoS-for-hire service - National Crime Agency https://www.nationalcrimeagency.gov.uk/news/nca-infiltrates-world-s-most-prolific-ddos-for-hire-service
29/07/2024 00:06:28
QRCode
archive.org
thumbnail

The National Crime Agency has infiltrated a significant DDoS-for-hire service which has been responsible for tens of thousands of attacks every week across the globe.

The disruption targeting digitalstress.su, a criminal marketplace offering DDos capabilities, was made in partnership with the Police Service of Northern Ireland.

It comes after the PSNI arrested one of the site’s suspected controllers earlier this month.

nationalcrimeagency.gov.uk EN 2024 DDoS-for-hire service cybercrime infiltrated
Six-day, 14.7 Million RPS Web DDoS Attack Campaign Attributed to SN_BLACKMETA https://www.radware.com/security/threat-advisories-and-attack-reports/six-day-web-ddos-attack-campaign/?ref=news.risky.biz
26/07/2024 08:24:00
QRCode
archive.org
thumbnail

Key Attack Insights:

  • Web DDoS attack campaign lasted six days and peaked at 14.7 Million RPS
  • Featured multiple attack waves amounting to a total of 100 hours of attack time
  • Sustained an average of 4.5 million RPS
  • Targeted a financial institution in the Middle East
  • Averaged a 0.12% ratio of legitimate to malicious web requests
  • Attributed by Radware to SN_BLACKMETA, a pro-Palestinian hacktivist with potential ties to Sudan that may operate from within Russia
  • Possibly leveraged the InfraShutdown premium DDoS-for-hire service
radware EN 2024 DDoS SN_BLACKMETA hacktivist pro-Palestinian InfraShutdown DDoS-for-hire
NCA infiltrates DDoS-for-hire site as suspected controller arrested in Northern Ireland https://therecord.media/ddos-for-hire-site-digitalstress-takedown-arrest-uk-nca?_hsenc=p2ANqtz--tk3NSwzBjpMd2OrSfoxfnwqMFXLtL6ft8YSqniI2lZESznkCSzsDvXNxeiB5mDGdYYpMP1Rtxs7nRGOQcg0RVBvCgeQ&_hsmi=316808198
23/07/2024 08:14:14
QRCode
archive.org
thumbnail

The U.K.'s National Crime Agency said it disrupted DigitalStress, a DDoS-for-hire operation that has been “responsible for tens of thousands of attacks every week across the globe.”

therecord.media EN 2024 UK NCA DDoS DigitalStress busted DDoS-for-hire
NoName057(16) | https://www.netscout.com/blog/asert/noname057-16
17/01/2024 11:29:32
QRCode
archive.org
thumbnail

NoName057(16) relies heavily on HTTPS application-layer DDoS attacks, with many attacks repeatedly sourced from the same attack harness, networks, and targeting similar countries and industries.

netscout EN 2024 ddos russia ukraine NoName057 NoName NoName057(16) DDoS hacktivism geopolitics crypto nato russo-ukrainian http https http-attacks https-attacks application-layer-attacks ddosia bobik ddos-for-hire golang bulletproof
4261 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio