Police Crackdown on DDoS Services Users Following Europol Operation
Following a successful operation in April 2018, police services across Europe and beyond are tracking down the users of DDoS-for-hire services.
Police services across Europe are working to track down the users of Distributed Denial of Service (DDoS) attack services.
In April 2018, a joint operation between Europol, the Joint Cybercrime Action Taskforce (J-CAT), Dutch police and the National Crime Agency took down illegal marketplace webstresser.org.
This operation gave police services, across Europe and beyond, detailed information about the website’s 151,000 registered users. Webstresser.org is believed to have been the world’s largest marketplace to hire DDoS services, which helped launch more than four million attacks for as little as 15 euros per month.
In the UK, a number of webstresser users have already been visited by police, who have seized more than 60 personal electronic devices as part of Operation Power OFF, Europol said.
Police are also conducting a number of live operations against DDoS criminals. More than 250 users of the marketplace and other DDoS services “will soon face action for the damage they have caused,” Europol said in a statement.
The global impact of DDoS attacks has been progressively rising and can cause devastating effects on businesses, organisations. These attacks can also deprive people of vital services offered by banks, government institutions and police forces.
The DDoS-for-hire trend is a “pressing issue”, Europol believes, and the ongoing popularity of this attack method is due to the accessibility of services online.
“Stresser and booter services have effectively lowered the entry barrier into cybercrime,” the agency said. “For a small nominal fee, any low-skilled individual can launch DDoS attacks with the click of a button, knocking offline whole websites and networks by barraging them with traffic.”
A 30-year-old hacker was recently sentenced to almost three years in prison in the UK after being found guilty of carrying out DDoS attacks against a Liberian mobile phone and internet company.
On this particular occasion, the hacker used rented botnets and stressers before developing his own botnet.