13 domains connected to DDoS systems were shut down by the FBI
As part of Operation PowerOFF, the U.S. DoJ reported its confiscation of 13 new domains linked to DDoS-for-hire services.
13 domains connected to DDoS-for-hire services have been seized, according to the US Justice Department, inside of Operation PowerOFF, a coordinated international law enforcement operation. Registered users can launch order-based DDoS attacks using ‘booter’ or DDoS-for-hire services without specialized training.
According to DoJ
Millions of users used the DDoS-for-hire services to attack millions of victims is revealed via the data seized by Law Enforcement. Mainly focused on the following areas.
- School Districts,
- Universities,
- Financial Institutions, and
- Government Websites.
10 out of 13 domains seized in the Operation PowerOff are the remake of booters that were laid down in December.
Dec, 2022
FBI seized 48 Domains connected with DDoS-for-Hire service platforms in Operation PowerOFF.
Doj, Press Release
The booter services investigation is still going on. Moreover, “The prices of such overprovision or DDoS protection services are usually significantly higher than the cost of a given booter service.” |
Affidavit, This week, Seizure Warrants
“Victims who are attacked by such services, or those providing Internet services to the victims, often have to ‘overprovision,’ that is, pay for increased Internet bandwidth in order to absorb the attacks, or subscribe to DDoS protection services, or purchase specialized hardware designed to mitigate the effects of DDoS attacks,” according to the affidavit in support of the seizure warrants filed this week.” |
Los Angeles in Late 2022
Justice Department also cleared that 4 out of all were proven guilty of federal charges & admitted to their crimes in the operation of the DDoS-for-hire services case. Those 4 are going to get sentenced this summer.
The defendants are:
- Jeremiah Sam Evans Miller, aka “John The Dev,” 23, of San Antonio, Texas,
- pleaded guilty on April 6 to conspiracy and violating the computer fraud and abuse act related to the operation of a booter service named RoyalStresser.com (formerly known as Supremesecurityteam.com);
- Angel Manuel Colon Jr., aka “Anonghost720” and “Anonghost1337,” 37, of Belleview, Florida,
- pleaded guilty on February 13 to conspiracy and violating the computer fraud and abuse act related to the operation of a booter service named SecurityTeam.io;
- Shamar Shattock, 19, of Margate, Florida, pleaded guilty on March 22
- To conspiracy to violate the computer fraud and abuse act related to the operation of a booter service known as Astrostress.com; and
- Cory Anthony Palmer, 23, of Lauderhill, Florida, pleaded guilty on February 16
- to conspiracy to violate the computer fraud and abuse act related to the operation of a booter service known as Booter.sx.
December, 2018
The U.S. District Court for the Central District of California ordered the seizure of the platforms (including critical-boot(.)com, ragebooter(.)com, downthem(.)org, and quantumstress(.)net) on December 19, 2018, and the FBI seized 15 other domains linked to DDoS-for-hire businesses.
For more amazing facts & information like this, you can follow us on News4Hackers. Leave a comment if you have any queries.
Read More Article Here: