KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Krebs on Security

KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS - KrebsOnSecurity last week was hit by a near record distributed denial-of-service (... https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/ #u.s.departmentofjustice #internetofthings(iot) #kaikesouthierleite #neer-do-wellnews #alittlesunshine #thecomingstorm #damianmenscher #ddos-for-hire #projectshield #aisurubotnet #breadcrumbs #qianxinxlab #cloudflare #stresser #akamai #booter #jigsaw #forky #mirai
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Krebs on Security

It's interesting how the operation #PowerOff regularly dominates the #DDoS timeline for their take down of #booter / #stresser services.

It needs to happen, I agree, and it is great work done by the authorities. But it really leaves an aftertaste, since a couple of weeks later the landscape is back to normal with new services, new domains, same old business model.

#infosec #operationpoweroff

Duitsland ontmantelt ddos-platform dstat[.]cc: twee verdachten aangeh

De Duitse politie heeft met succes het DDoS-platform dstat[.]cc ontmanteld, waardoor een belangrijke criminele dienst voor cyberaanvallen is stilgelegd. Twee v

Het laatste, trending tech nieuws
FBI übernimmt Domains von 13 DDoS-Dienstleistern

Zehn der jetzt beschlagnahmten Domains gehörten zu DDoS-Anbietern, denen das FBI eigentlich schon im Dezember den Saft abgedreht hatte.

Tarnkappe.info
UK Sets Up Fake Booter Sites To Muddy DDoS Market – Krebs on Security

UK Sets Up Fake Booter Sites To Muddy DDoS Market - The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DD... https://krebsonsecurity.com/2023/03/uk-sets-up-fake-booter-sites-to-muddy-ddos-market/ #u.s.departmentofjustice #nationalcrimeagency #operationpoweroff #alittlesunshine #ddos-for-hire #webfraud2.0 #stresser #booter
UK Sets Up Fake Booter Sites To Muddy DDoS Market – Krebs on Security

Most people who operate DDoS-for-hire businesses attempt to hide their true identities and location. Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law. But until recently, their biggest concern wasn’t avoiding capture or shutdown by the feds: It was minimizing harassment from unhappy customers or victims, and insulating themselves against incessant attacks from competing DDoS-for-hire services.

And then there are booter store operators like John Dobbs, a 32-year-old computer science graduate student living in Honolulu, Hawaii. For at least a decade until late last year, Dobbs openly operated IPStresser[.]com, a popular and powerful attack-for-hire service that he registered with the state of Hawaii using his real name and address. Likewise, the domain was registered in Dobbs’s name and hometown in Pennsylvania.

https://krebsonsecurity.com/2023/01/thinking-of-hiring-or-running-a-booter-service-think-again/

Saved the best quote till the end, from @nixonnixoff :

"“When a booter service claims they don’t share logs, they’re lying because logs are legal leverage for when the booter service operator gets arrested,” Nixon said. “And when they do, you’re going to be the first people they throw under the bus.”

#booter #stresser #ddosforhire #ddos #Dobbs #IPStresser

Thinking of Hiring or Running a Booter Service? Think Again. – Krebs on Security

The U.S. Department of Justice (DOJ) today seized four-dozen domains that sold “#booter” or “#stresser” services — businesses that make it easy and cheap for even non-technical users to launch powerful Distributed Denial of Service (#DDoS) attacks designed knock targets offline. The DOJ also charged six U.S. men with computer crimes related to their alleged ownership of the popular DDoS-for-hire services.

The DOJ said the 48 domains it seized helped paying customers launch millions of digital sieges capable of knocking Web sites and even entire network providers offline.

One of the defendants has allegedly been peddling DDoS for more than a decade. John M. Dobbs, 32, of Honolulu, HI is charged with aiding and abetting violations of the CFAA related to the operation of IPStresser[.]com, which he allegedly operated for nearly 13 years until last month. During that time, IPstresser launched approximately 30 million DDoS attacks and garnered more than two million registered users.

https://krebsonsecurity.com/2022/12/six-charged-in-mass-takedown-of-ddos-for-hire-sites/

Six Charged in Mass Takedown of DDoS-for-Hire Sites – Krebs on Security

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison - A 33-year-old Illinois man was sentenced to two years in prison today following hi... https://krebsonsecurity.com/2022/06/downthem-ddos-for-hire-boss-gets-2-years-in-prison/ #juanseveronmartinez #neer-do-wellnews #ddos-for-hire #matthewgatrel #downthem #stresser #ampnode #booter
“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison – Krebs on Security