75,000 suspects identified as global crackdown dismantles dozens of DDoS infrastructures | #cybercrime | #infosec


The result has been overwhelming: over 75,000 users linked to this type of illegal activities identified.

During this operation, named PowerOFF, 75,000 warning emails and letters were sent to individuals involved in the use of for-hire attack platforms.

Additionally, four arrests were made, 53 domains associated with these infrastructures were deactivated, and 25 search warrants were issued in different jurisdictions.

The joint action involved the participation of Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, Netherlands, Norway, Poland, Portugal, Sweden, Thailand, United Kingdom, and United States.

According to data shared by Europol, this operation is part of an effort that had been working for many months with the aim of dismantling networks that facilitate large-scale attacks against digital services.

How DDoS for-hire services work

The business model behind DDoS attacks has evolved into platforms known as booter or stresser.

These services allow any user, even without advanced technical knowledge, to launch attacks against websites, servers, or entire networks by following simple instructions.

The infrastructure supporting these services includes distributed servers, target databases, and automated systems capable of generating massive traffic to overwhelm the attacked systems.

By intervening in these infrastructures, authorities have managed to cut off a significant part of the operational capacity of cybercriminals.

During the months leading up to the action week, international teams carried out various operational sprints, where cybersecurity specialists and police forces collaborated to identify the most active users and dismantle key services.

As a result, databases with information on more than 3 million accounts linked to DDoS for-hire platforms were seized.

This volume of data has allowed Europol and national agencies to generate actionable intelligence, facilitating the identification, geolocation, and tracking of thousands of suspects in different countries.

An accessible and expanding cybercrime

One of the most concerning aspects of the phenomenon is its accessibility. Unlike other more complex forms of cyberattack, DDoS for-hire can be executed by users with very basic knowledge, greatly expanding the potential base of criminals.

According to Europol, this ease of access has made DDoS one of the most widespread trends within the digital crime ecosystem.

The attacks are often directed at geographically close targets, such as local businesses, telecommunications providers, or e-commerce platforms, although larger coordinated campaigns are also recorded.

The motivations behind these attacks are diverse. In some cases, they are simple tests or curiosity, especially among young users.

In others, they are linked to hacktivism movements or extortion strategies, where attackers demand payments in exchange for ceasing service interruptions. Illegal competitive uses are also detected, with companies seeking to harm rivals by blocking their systems.

What is the strategy behind Operation PowerOFF?

As Operation PowerOFF progresses, authorities have begun to strengthen their preventive strategy with police actions and awareness campaigns directed at potential offenders.

Among the measures adopted is the creation of specific ads on search engines like Google, designed to intercept users searching for DDoS for-hire tools. These messages warn of the legal consequences and the criminal nature of these practices.

Additionally, more than 100 URLs promoting illegal services of this type have been removed from search results, reducing their visibility and accessibility.

Other relevant initiative has been the sending of warning messages directly on blockchains used by criminals to make payments, an innovative strategy that seeks to impact the financial environment of these activities.

Furthermore, the official portal of the operation www.operationpoweroff.eu has been updated to offer detailed tracking of ongoing actions and reinforce the transparency of the process.

The success of the operation has been achieved thanks to close cooperation between police forces and specialized agencies from the 21 participating countries.

Among them are organizations such as the FBI and the Department of Justice in the United States, the Australian Federal Police, the Federal Criminal Police Office in Germany, or the Judicial Police in Portugal, among others.

The result has been overwhelming: over 75,000 users linked to this type of illegal activities identified.

During this operation, named PowerOFF, 75,000 warning emails and letters were sent to individuals involved in the use of for-hire attack platforms.

Additionally, four arrests were made, 53 domains associated with these infrastructures were deactivated, and 25 search warrants were issued in different jurisdictions.

The joint action involved the participation of Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, Netherlands, Norway, Poland, Portugal, Sweden, Thailand, United Kingdom, and United States.

According to data shared by Europol, this operation is part of an effort that had been working for many months with the aim of dismantling networks that facilitate large-scale attacks against digital services.

How DDoS for-hire services work

The business model behind DDoS attacks has evolved into platforms known as booter or stresser.

These services allow any user, even without advanced technical knowledge, to launch attacks against websites, servers, or entire networks by following simple instructions.

The infrastructure supporting these services includes distributed servers, target databases, and automated systems capable of generating massive traffic to overwhelm the attacked systems.

By intervening in these infrastructures, authorities have managed to cut off a significant part of the operational capacity of cybercriminals.

During the months leading up to the action week, international teams carried out various operational sprints, where cybersecurity specialists and police forces collaborated to identify the most active users and dismantle key services.

As a result, databases with information on more than 3 million accounts linked to DDoS for-hire platforms were seized.

This volume of data has allowed Europol and national agencies to generate actionable intelligence, facilitating the identification, geolocation, and tracking of thousands of suspects in different countries.

An accessible and expanding cybercrime

One of the most concerning aspects of the phenomenon is its accessibility. Unlike other more complex forms of cyberattack, DDoS for-hire can be executed by users with very basic knowledge, greatly expanding the potential base of criminals.

According to Europol, this ease of access has made DDoS one of the most widespread trends within the digital crime ecosystem.

The attacks are often directed at geographically close targets, such as local businesses, telecommunications providers, or e-commerce platforms, although larger coordinated campaigns are also recorded.

The motivations behind these attacks are diverse. In some cases, they are simple tests or curiosity, especially among young users.

In others, they are linked to hacktivism movements or extortion strategies, where attackers demand payments in exchange for ceasing service interruptions. Illegal competitive uses are also detected, with companies seeking to harm rivals by blocking their systems.

What is the strategy behind Operation PowerOFF?

As Operation PowerOFF progresses, authorities have begun to strengthen their preventive strategy with police actions and awareness campaigns directed at potential offenders.

Among the measures adopted is the creation of specific ads on search engines like Google, designed to intercept users searching for DDoS for-hire tools. These messages warn of the legal consequences and the criminal nature of these practices.

Additionally, more than 100 URLs promoting illegal services of this type have been removed from search results, reducing their visibility and accessibility.

Other relevant initiative has been the sending of warning messages directly on blockchains used by criminals to make payments, an innovative strategy that seeks to impact the financial environment of these activities.

Furthermore, the official portal of the operation www.operationpoweroff.eu has been updated to offer detailed tracking of ongoing actions and reinforce the transparency of the process.

The success of the operation has been achieved thanks to close cooperation between police forces and specialized agencies from the 21 participating countries.

Among them are organizations such as the FBI and the Department of Justice in the United States, the Australian Federal Police, the Federal Criminal Police Office in Germany, or the Judicial Police in Portugal, among others.




Click Here For The Original Source.

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW