German police arrest two for alleged ties to DDoS-for-hire platform

Avatar

German police shut down a platform used to carry out distributed denial-of-service (DDoS) attacks and arrested two men who allegedly operated the site. 

Police seized infrastructure tied to the platform, Dstat.cc, as well as Flight RCS — a clear web marketplace for designer drugs and synthetic cannabinoids. The takedown operation was conducted by the Central Office for Combating Internet Crime in Frankfurt, the Hessian State Criminal Police Office and the Federal Criminal Police Office. 

It is part of “Operation PowerOff,” an international initiative to disrupt the DDoS-for-hire industry, which has opened the door for hacktivists and others with limited technical expertise to carry out disruptive cyberattacks in which targeted servers are flooded with traffic. 

Dstat.cc, which now has a notice on its homepage from law enforcement that it has been seized, allegedly provided information about so-called stresser and booter services — the tools used to carry out DDoS attacks.  

In an advisory from January 2023, the cybersecurity company Radware said “Dstat.cc… provides reviews and contact information for the booter services, allowing potential subscribers to compare and find the best service for their malicious intents.”  

The two unnamed defendants, who are 19 and 28, are accused of “having provided and administered various criminal infrastructures on the Internet” both for selling narcotics and for “computer sabotage.” 

The yearslong “Operation PowerOFF” initiative has resulted in a handful of large-scale seizures, including the takedown of 48 DDoS-for-hire service providers in December 2022. 

Last month, the U.S. indicted two men allegedly connected to the Anonymous Sudan group and revealed that it had seized and disabled the group’s DDoS tool, which it would sell to other criminal actors.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Next Post

California court suffering from tech outages after cyberattack

Related Posts

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the
Avatar
Read More

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities

In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as “the new perimeter”, the identity stands between safe data management and potential breaches. However, a new report reveals how enterprises are often unaware of how their identities are being used across various platforms. This leaves them vulnerable to data
Avatar
Read More

A Hacker’s Guide to Password Cracking

Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense, you must think like a hacker and anticipate their moves. Read on to learn more about hackers'
Avatar
Read More