CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 17, 2026

53 DDoS Domains Taken Down by Law Enforcement

Security Week Archived Apr 17, 2026 ✓ Full text saved

Authorities in 21 countries participated in a coordinated action against DDoS-for-hire services. The post 53 DDoS Domains Taken Down by Law Enforcement appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Law enforcement agencies in 21 countries this week participated in a coordinated operation targeting distributed denial-of-service (DDoS) attack services and their users, Europol announced. DDoS-for-hire, or booter services, allow miscreants of all types, ranging from people with minimal technological background to proficient threat actors, to disrupt web and telecommunications services for financial gain, ideological purposes, or other motivations. Part of Operation PowerOff, the new law enforcement operation led to the takedown of 53 domains associated with DDoS-for-hire services and the arrest of four individuals. Additionally, 75 000 warning emails and letters were sent to the identified users of these services, and 25 search warrants were executed.  The action, Europol explains, was the result of several operational sprints that gathered experts from national authorities to disrupt the illegal booter services and their infrastructure. “Booter services allow users to launch DDoS attacks against targeted websites, servers, or networks. Their infrastructure is made up of servers, databases, and other technical components that make DDoS-for-hire activities possible,” Europol notes. The sprints resulted in the seizure of infrastructure to prevent further damage. They also led to the exposure of over 3 million criminal user accounts. According to Europol, authorities in Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Norway, Poland, Portugal, Sweden, Thailand, the UK, and the US participated in the operation. Following the takedown, Operation PowerOff will transition to a prevention phase, involving the removal of 100 URLs promoting booter services from search engines, the placement of ads targeting individuals searching for DDoS-for-hire services, and the placement of warnings on blockchains used by cybercriminals. Operation PowerOff has been ongoing for nearly a decade and has resulted in the disruption of dozens of DDoS-for-hire services, including prominent ones such as Webstresser, DigitalStress, Stresser.tech, and many others. Related: Evasive Masjesu DDoS Botnet Targets IoT Devices Related: Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation Related: US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking Related: Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet WRITTEN BY Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Cisco Patches Critical Vulnerabilities in Webex, ISE Ransomware Hits Automotive Data Expert Autovista Capsule Security Emerges From Stealth With $7 Million in Funding 100 Chrome Extensions Steal User Data, Create Backdoor Mirax RAT Targeting Android Users in Europe Two Vulnerabilities Patched in Ivanti Neurons for ITSM  Fortinet Patches Critical FortiSandbox Vulnerabilities SAP Patches Critical ABAP Vulnerability Latest News Cursor AI Vulnerability Exposed Developer Devices Government Can’t Win the Cyber War Without the Private Sector OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal Data Breach at Tennessee Hospital Affects 337,000 Artemis Emerges From Stealth With $70 Million in Funding Splunk Enterprise Update Patches Code Execution Vulnerability Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking Contest NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software Trending Webinar: A Step-By-Step Approach To AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer. Thomas Bain has been appointed Chief Marketing Officer at Silent Push. The United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure. More People On The Move Expert Insights Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules Of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    Apr 17, 2026
    Archived
    Apr 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗