``Operation power off'' operation to expose 13 domains that operated DDoS attack agency service will be executed



It has been reported that many companies and government agencies have been

damaged by DDoS attacks that send a huge amount of traffic to the attack target and put it in an unprocessable state. Meanwhile, on May 8, 2023, the US Department of Justice announced that it had seized 13 Internet domains that operated DDoS attack agency services.

Central District of California | Federal Authorities Seize 13 Internet Domains Associated with 'Booter' Websites that Offered DDoS Computer Attack Services | United States Department of Justice
https://www.justice.gov/usao-cdca/pr/federal-authorities-seize-13-internet-domains-associated-booter-websites-offered-ddos



Booter-seizure-warrant-Tucows
(PDF file)

https://krebsonsecurity.com/wp-content/uploads/2023/05/Booter-seizure-warrant-Tucows.pdf



Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown | Ars Technica

https://arstechnica.com/information-technology/2023/05/feds-seize-13-more-ddos-for-hire-platforms-in-ongoing-international-crackdown/

DDoS attack proxy services called 'Booter' and ' Stresser ' use multiple computers to send excessive data to the attack target to make it impossible to process. The U.S. Federal Bureau of Investigation (FBI) has warned that conducting a DDoS attack is punishable under both the Wire Fraud Act and the Computer Fraud and Abuse Act, and can lead to arrests, prosecutions and seizures of electronic devices. I'm here.

This time, 10 of the 13 domains of the DDoS attack agency seized by the U.S. Department of Justice are part of the 48 DDoS attack agency seized in December 2022. assigned to the website. In December 2022, six suspects were indicted for operating a website that acts as a DDoS attack.

Six men who operated a proxy site that can DDoS attack on your favorite site if you pay money will be prosecuted - GIGAZINE



According to the US Department of Justice, one of the domains seized this time, 'cyberstress.org', is believed to have performed exactly the same service as 'cyberstress.us', which was seized in December. The U.S. Department of Justice said, ``Many DDoS attack agency services seized so far, including the domains seized in December 2022, have not resumed their services, but some DDoS attack agency services have been named. It has been revived many times by changing it.The action of the US Department of Justice this time was targeted at the operator of the site that continues such criminal activity.'

The domain seizure operation, dubbed 'Operation Power Off,' was jointly conducted by the FBI and the US Department of Justice. 'The FBI conducted a sting operation with investigators and other officials visiting each website during the domain seizure,' said FBI agent Elliott Peterson. The FBI believes it is being used to carry out attacks to forcibly disconnect a victim's device from an established Internet connection, severely slow down communication speeds, or otherwise cause similar harm.' said.



The U.S. Department of Justice also revealed that four of the six suspects indicted in December 2022 pleaded guilty in early 2023. Jeremiah Sam Evans Miller, who once operated 'Supremesecurityteam.com' and then 'RoyalStresser.com', admitted conspiracy charges and computer fraud and abuse prevention law violations related to the operation of the DDoS attack agency service. Suspect Angel Manuel Colon Jr. who operated 'SecurityTeam.io', Cory Anthony Palmer suspect who operated 'Booter.sx' 'Astrostress.com' Suspect Shamar Shattock. .

The trial of the four people who pleaded guilty this time is scheduled to be held in the summer of 2023.

in Security, Posted by log1r_ut