18.2 C
New York
Wednesday, May 14, 2025

FBI seizes 13 extra domains linked to DDoS-for-hire companies


cyberstress.org seizure banner

cyberstress.org seizure banner (DOJ)

The U.S. Justice Division introduced right this moment the seizure of 13 extra domains linked to DDoS-for-hire platforms, also referred to as ‘booter’ or ‘stressor’ companies.

This week’s seizures are a part of a coordinated worldwide regulation enforcement effort (referred to as Operation PowerOFF) to disrupt on-line platforms permitting anybody to launch large distributed denial-of-service (DDoS) assaults in opposition to any goal for the precise amount of cash.

“As a part of an ongoing initiative focusing on pc assault ‘booter’ companies, the Justice Division right this moment introduced the court-authorized seizure of 13 web domains related to these DDoS-for-hire companies,” the Division of Justice mentioned.

“The seizures this week are the third wave of U.S. regulation enforcement actions in opposition to distinguished booter companies that allowed paying customers to launch highly effective distributed denial-of-service, or DDoS, assaults that flood focused computer systems with data and stop them from having the ability to entry the web.”

The FBI additionally focused prime stresser companies in December 2022 when it seized one other 48 domains, with ten beforehand disrupted platforms registering new domains, permitting them to remain on-line.  

“Ten of the 13 domains seized right this moment are reincarnations of companies that have been seized throughout a previous sweep in December, which focused 48 prime booter companies,” the DOJ mentioned.

“For instance, one of many domains seized this week – cyberstress.org – seems to be the identical service operated underneath the area cyberstress.us, which was seized in December.”

The entire record of domains taken down this week by the FBI and beforehand seized domains linked to the identical operations is embedded beneath.

List of seized domains
Listing of seized domains (DOJ)

​In accordance with the affidavit, the FBI examined the booter companies whose domains have been seized by opening or renewing accounts with every of them and assessed the consequences on track computer systems by way of DDoS assaults launched on computer systems managed by the company. 

These checks helped affirm the booters’ performance, with the FBI saying that some assaults took the focused gadgets offline although they have been utilizing high-capacity Web connections.

“The FBI examined every of companies related to the SUBJECT DOMAINS, that means that brokers or different personnel visited every of the web sites and both used earlier login data or registered a brand new account on the service to conduct assaults,” FBI Particular Agent Elliott Peterson mentioned.

“I imagine that every of the SUBJECT DOMAINS is getting used to facilitate the fee of assaults in opposition to unwitting victims to forestall the victims from accessing the Web, to disconnect the sufferer from or degrade communication with established Web connections, or to trigger different comparable harm.”

DDoS test conducted by the FBI using the cyberstress.org booter
DDoS take a look at carried out by the FBI utilizing the cyberstress.org booter (FBI)

​4 defendants charged in late 2022 additionally pleaded responsible earlier this 12 months to federal fees, admitting that they have been both concerned in or operated among the booter companies focused by regulation enforcement.

The record of defendants and the fees they pleaded responsible to consists of:

  • Jeremiah Sam Evans Miller, aka “John The Dev,” 23, of San Antonio, Texas, admitted on April 6 to conspiracy and violating the pc fraud and abuse act associated to the operation of a booter service named RoyalStresser.com (previously referred to as Supremesecurityteam.com);
  • Angel Manuel Colon Jr., aka “Anonghost720” and “Anonghost1337,” 37, of Belleview, Florida, pleaded responsible on February 13 to conspiracy and violating the pc fraud and abuse act associated to the operation of a booter service named SecurityTeam.io;
  • Shamar Shattock, 19, of Margate, Florida, pleaded responsible on March 22 to conspiracy to violate the pc fraud and abuse act associated to the operation of a booter service referred to as Astrostress.com; and
  • Cory Anthony Palmer, 23, of Lauderhill, Florida, pleaded responsible on February 16 to conspiracy to violate the pc fraud and abuse act associated to the operation of a booter service referred to as Booter.sx.

Legislation enforcement’s current seizures present their dedication to focusing on booter service platforms, although some beforehand taken down domains have resurfaced.

Related Articles

Latest Articles