Fake DDoS services set up to trap cybercriminals

Categories: News

Tags: NCA

Tags: national crime agency

Tags: DDoS

Tags: distributed denial of service

Tags: booter

Tags: underground

The British National Crime Agency has been setting up fake DDoS services to teach people a lesson in what not to do online.

(Read more…)

The post Fake DDoS services set up to trap cybercriminals appeared first on Malwarebytes Labs.

Read more

UK Sets Up Fake Booter Sites To Muddy DDoS Market

Credit to Author: BrianKrebs| Date: Tue, 28 Mar 2023 17:26:07 +0000

The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. 

Read more

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison

Credit to Author: BrianKrebs| Date: Tue, 14 Jun 2022 00:09:09 +0000

A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites.

Read more

250 Webstresser Users to Face Legal Action

Credit to Author: BrianKrebs| Date: Fri, 01 Feb 2019 13:43:59 +0000

More than 250 customers of a popular and powerful online attack-for-hire service that was dismantled by authorities in 2018 are expected to face legal action for the damage they caused, according to Europol, the European Union’s law enforcement agency. In April 2018, investigators in the U.S., U.K. and the Netherlands took down attack-for-hire service WebStresser[.]org and arrested its alleged administrators. Prior to the takedown, the service had more than 151,000 registered users and was responsible for launching some four million attacks over three years. Now, those same authorities are targeting people who paid the service to conduct attacks.

Read more

DDoS-for-Hire Service Webstresser Dismantled

Credit to Author: BrianKrebs| Date: Wed, 25 Apr 2018 17:41:37 +0000

Authorities in the U.S., U.K. and the Netherlands on Tuesday took down popular online attack-for-hire service WebStresser.org and arrested its alleged administrators. Investigators say that prior to the takedown, the service had more than 136,000 registered users and was responsible for launching somewhere between four and six million attacks over the past three years.

Read more

Fear the Reaper, or Reaper Madness?

Credit to Author: BrianKrebs| Date: Fri, 27 Oct 2017 20:39:21 +0000

Last week we looked at reports from China and Israel about a new “Internet of Things” malware strain called “Reaper” that researchers said infected more than a million organizations by targeting newfound security weaknesses in countless Internet routers, security cameras and digital video recorders (DVRs). Now some botnet experts are calling on people to stop the “Reaper Madness,” saying the actual number of IoT devices infected with Reaper right now is much smaller. Arbor Networks said it believes the current actual size of the Reaper botnet fluctuates between 10,000 and 20,000 bots total. Arbor notes that this can change any time.

Read more

Alleged vDOS Operators Arrested, Charged

Credit to Author: BrianKrebs| Date: Wed, 09 Aug 2017 15:43:24 +0000

Two young Israeli men alleged by this author to have co-founded vDOS — until recently the largest and most profitable cyber attack-for-hire service online — were arrested and formally indicted this week in Israel on conspiracy and hacking charges.

Read more

Following the Money Hobbled vDOS Attack-for-Hire Service

Credit to Author: BrianKrebs| Date: Tue, 06 Jun 2017 12:12:47 +0000

A new report proves the value of following the money in the fight against dodgy cybercrime services known as “booters” or “stressers” — virtual hired muscle that can be rented to knock nearly any website offline. Last fall, two 18-year-old Israeli men were arrested for allegedly running a vDOS, perhaps the most successful booter service of all time. The pair were detained within hours of being named in a story on this blog as the co-proprietors of the service (this site would later suffer a three-day outage as a result of an attack that was alleged to have been purchased in retribution for my reporting on vDOS). That initial vDOS story was based on data shared by an anonymous source who had hacked vDOS and obtained its private user and attack database. The story showed how the service made approximately $600,000 over just two of the four years it was in operation. Most of those profits came in the form of credit card payments via PayPal. But prior to vDOS’s takedown in September 2016, the service was already under siege thanks to work done by a group of academic researchers who teamed up with PayPal to identify and close accounts that vDOS and other booter services were using to process customer payments. The researchers found that their interventions cut profits in half for the popular booter service, and helped reduce the number of attacks coming out of it by at least 40 percent.

Read more