Webstresser DDoS Attack Site Shut Down in International Operation

  /     /     /  
Publicated : 22/11/2024   Category : security


Webstresser DDoS Attack Site Shut Down in International Operation


Investigators arrested the admins of Webstresser, the worlds largest DDoS marketplace reportedly responsible for more than four million attacks.



The worlds largest online marketplace for selling and lauching distributed denial-of-service (DDoS) attacks was shut down this week as part of Operation Power Off, an international investigation into the so-called Webstresser.org site. The effort was led by the UK National Crime Agency (NCA) and Dutch National Police, with support from Europol and a dozen global law enforcement agencies, Europol reports.
Webstresser had more than 136,000 registered users, and threat actors have reportedly used it to launch at least four million cyberattacks, targeting government agencies, banks, police organizations, and victims in the gaming sector by flooding their servers with traffic,
according to Europol
.
The site simplified the process of launching DDoS attacks, once a threat mostly accessible to tech-savvy cybercriminals. Anybody, regardless of their technical skill level, could use Webstressers online payment system or cryptocurrency to rent out stressers or booters, which were available for as little as 15 EUR/month and could be used for destructive DDoS attacks.
Stressers and booters are for-hire services that grant access to DDoS botnets. Most aim to make money under the pretense of offering a legitimate, useful service to test servers resiliency. In reality, they usually dont require proof of identity from the individual launching the attack, nor do they ask whether the attacker is associated with the organization being targeted.
As this event illustrates, it remains ridiculously cheap to rent a devastating DDoS attack from these so-called DDoS stressers or on the Dark Web, says Andrew Lloyd, president of Corero Network Security. In many territories, it also remains a criminal offence.
Authorities in five countries, including Canada, Croatia, Serbia, and the Netherlands, along with support from Europol and Police Scotland, arrested six suspected members of the group behind Webstresser on April 24. Dutch Police, with support from Germany and the US, seized servers and started the takedown of the site on the morning of April 25.
Europols European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT) provided support for the investigation by enabling an information exchange among all participating organizations. On the day of the takedown, a command and coordination post was set up at Europol HQ. Europol reports measures were also taken against Webstressers top users in the Netherlands, Italy, Spain, Croatia, the UK, Australia, Canada, and Hong Kong.
NCA officials believe an attacker linked to an address in Bradford, UK, used Webstresser to target seven of the UKs largest banks in November 2017. The banks were forced to scale back their operations and, in some cases, shut down entire systems, costing hundreds of thousands of pounds in recovery. The address was identified and searched as part of this effort.
John Fokker, McAfees head of cyber investigations, notes how Webstresser points to the overall rise of attacks on the gaming sector, which is increasingly targeted as attacks become easier to launch. He also suggests a threat like this could have geopolitical implications.
Attacks on gaming servers predominately committed by young people are becoming increasingly popular and the relative ease with which these attacks are carried out by individuals with little hacking experience is striking, he says. Webstresser and other similar attacks suggest entire organizations or parts of a country can be disrupted for the price of a pound of good coffee beans.
Jo Goodall, senior investigating officer at the NCA, urged businesses and individuals to report cybercrime. In a
statement
, she points to the
Action Fraud
website, the UKs national fraud and cybercrime reporting center. Guidance on how to mitigate the effects of cyberattacks can be found at the National Cyber Security Centre
website
.
Related Content:
Low-Cost Crimeware Kit Gaining Popularity in Underground Markets
Coviello: Modern Security Threats are Less About the Techniques
Stresspaint Targets Facebook Credentials
Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity
Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda 
here
. Register with Promo Code DR200 and save $200.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Webstresser DDoS Attack Site Shut Down in International Operation