German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

Avatar
German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. “The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own,” the Federal Criminal Police Office (aka

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks.

“The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own,” the Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said.

“The use of stresser services to carry out DDoS attacks has recently become increasingly known in the context of police investigations.”

The BKA described dstat[.]cc as a platform that offered recommendations and evaluations of stresser services in order to conduct DDoS attacks against websites of interest and render them unresponsive.

According to an alert published by Radware, dstat[.]cc offered botnet owners the ability to assess the capacity and capabilities of their DDoS attack services.

“Bot herders use DStat sites to gauge and demonstrate the strength of their botnet, booter, or script against various unprotected and protected targets,” the company said.

Dstat[.]cc, based on the collected information from demonstration attacks, provides reviews and contact information for the booter services, allowing potential subscribers to compare and find the best service for their malicious intents.”

In tandem, two suspects aged 19 and 28 have been arrested from Darmstadt and the Rhein-Lahn districts. They are also accused of providing criminal infrastructure for the trafficking of narcotics in considerable quantities.

Specifically, they are alleged to have advertised and sold designer drugs and liquids made of synthetic cannabinoids on an online platform named “Flight RCS” that was accessible on the clearnet.

The takedown of dstat[.]cc is part of an ongoing concerted law enforcement operation dubbed PowerOFF, which has led to the closure of several DDoS-for-hire sites such as digitalstress[.]su and Anonymous Sudan in recent months.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Previous Post

Rep. Yvette Clarke on AI-fueled disinformation: ‘We have not protected ourselves in time for this election cycle’

Next Post

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

Related Posts

Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances

The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws. Targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link, and NETGEAR, according to a new report by French cybersecurity company Sekoia. "The Quad7 botnet operators appear to be
Avatar
Read More

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority (DPA) against Firefox maker Mozilla for enabling a new feature called Privacy Preserving Attribution (PPA) without explicitly seeking users' consent. "Contrary to its reassuring name, this technology allows Firefox to track user behavior on websites," noyb said
Avatar
Read More

A Hacker’s Guide to Password Cracking

Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense, you must think like a hacker and anticipate their moves. Read on to learn more about hackers'
Avatar
Read More