Polish police cracks down on DDoS-for-hire service active since 2013

Gandalf_The_Grey

Level 83
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,249
Polish police officers of the country's Central Bureau for Combating Cybercrime detained two suspects believed to have been involved in operating a DDoS-for-hire service (aka booter or stresser) active since at least 2013.

These arrests are part of an international law enforcement effort (known as Operation PowerOFF) aiming to disrupt and take down online platforms allowing anyone to launch massive distributed denial-of-service (DDoS) attacks against any target worldwide for the right amount of money.

The operation was conducted in coordination with Europol, the FBI, and law enforcement agencies from the Netherlands, Germany, and Belgium, under the supervision of the Joint Cybercrime Action Taskforce (J-CAT).

Polish Central Cybercrime Bureau officers arrested two individuals and conducted ten searches which helped collect valuable data from the perpetrators' server located in Switzerland.

Evidence collected from the suspects' servers revealed information on over 35,000 user accounts, 76,000 login records, and more than 320,000 unique IP addresses linked to the DDoS-for-hire service.

Furthermore, police officers also uncovered 11,000 records of purchased attack plans, with associated email addresses of service buyers who paid approximately $400,000, and over 1,000 records of attack plans worth around $44,000.

Polish police also found substantial evidence of operating and managing a criminal domain on the computer belonging to one of the suspects.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top