Take Down of World’s Biggest ‘DDoS-For-Hire’ Site (Learn More, Video)

DDoS attacks typically flood web servers with traffic to take them down and so-called ‘stressers' sell those attacks as a service, offering to take down customers' selected targets for a fee or providing direct access to a DDoS tool. According to investigators working on Operation Power Off, DDoS hits emanating from webstresser.org targeted banks, government institutions, police forces, schools and the gaming industry, investigators said.
DDoS attacks typically flood web servers with traffic to take them down and so-called ‘stressers' sell those attacks as a service, offering to take down customers' selected targets for a fee or providing direct access to a DDoS tool. According to investigators working on Operation Power Off, DDoS hits emanating from webstresser.org targeted banks, government institutions, police forces, schools and the gaming industry, investigators said.

The administrators of the DDoS marketplace webstresser.org were arrested on 24 April 2018 as a result of Operation Power Off, a complex investigation led by the Dutch National High Tech Crime Unit and the UK’s National Crime Agency with the support of Europol and a dozen law enforcement agencies from around the world.

The administrators were located in the United Kingdom, Croatia, Canada and Serbia.

Further measures were taken against the top users of this marketplace in the Netherlands, Italy, Spain, Croatia, the United Kingdom, Australia, Canada and Hong Kong.

The illegal service was shut down and its infrastructure seized in the Netherlands, the US and Germany.

Webstresser.org was considered the world’s biggest marketplace to hire Distributed Denial of Service (DDoS) services, with over 136 000 registered users and 4 million attacks measured by April 2018.

The market for DDoS stressers, as defined by Europol. (Courtesy of Europol)
The market for DDoS stressers, as defined by Europol. (Courtesy of Europol)

The orchestrated attacks targeted critical online services offered by banks, government institutions and police forces, as well as victims in the gaming industry.

Devastation for hire

In a DDoS attack enabled by such a service, the attacker remotely controls connected devices to direct a large amount of traffic at a website or an online platform.

Whether this traffic eats up the website’s bandwidth, overwhelms the server, or consumes other essential resources, the end result of an unmitigated DDoS attack is the same:

  • The victim website is either slowed down past the point of usability, or it’s knocked completely offline, depriving users from essential online services.

It used to be that in order to launch a DDoS attack, one had to be pretty well versed in internet technology.

That is no longer the case.

(Courtesy of Pinterest)

With webstresser.org, any registered user could pay a nominal fee using online payment systems or cryptocurrencies to rent out the use of stressers and booters.

Fees on offer were as low as EUR 15.00 a month, thus allowing individuals with little to no technical knowledge to launch crippling DDoS attacks.

This is what visitors to Webstresser.org will see following a take down by a global law enforcement operation. (Courtesy of Europol)
This is what visitors to Webstresser.org will see following a take down by a global law enforcement operation. (Courtesy of Europol)

International law enforcement cyber sweep

International police cooperation was central to the success of this investigation initiated by the Dutch National High Tech Crime Unit and the UK National Crime Agency, as the administrators, users, critical infrastructure and victims were scattered across the world.

Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT) supported the investigation from the onset by facilitating the exchange of information between all partners.

A command and coordination post was set up at Europol’s headquarters in The Hague on the action day.

Steven Wilson, Head of European Cybercrime Centre (EC3) EUROPOL
Steven Wilson, Head of European Cybercrime Centre (EC3) EUROPOL

“We have a trend where the sophistication of certain professional hackers to provide resources is allowing individuals – and not just experienced ones – to conduct DDoS attacks and other kind of malicious activities online”, said Steven Wilson, Head of Europol’s European Cybercrime Centre (EC3).

“It’s a growing problem, and one we take very seriously. Criminals are very good at collaborating, victimising millions of users in a moment form anywhere in the world.”

“We need to collaborate as good as them with our international partners to turn the table on these criminals and shut down their malicious cyberattacks.”

Jaap van Oss
Jaap van Oss, Dutch Chairman of J-CAT

“Stresser websites make powerful weapons in the hands of cybercriminals” said Jaap van Oss, Dutch Chairman of the Joint Cybercrime Action Taskforce (J-CAT).

“International law enforcement will not tolerate these illegal services and will continue to pursue its admins and users.”

“This joint operation is yet another successful example of the ongoing international effort against these destructive cyberattacks.”

(Learn More. Privacy in the Digital Age of Encryption and Anonymity Online. Courtesy of Europol and YouTube. Posted on May 26, 2016)

DDoS-ing is a crime

DDoS attacks are illegal.

Many IT enthusiasts get involved in seemingly low-level fringe cybercrime activities, unaware of the consequences that such crimes carry.

The penalties can be severe: if you conduct a DDoS attack, or make, supply or obtain stresser or booter services, you could receive a prison sentence, a fine or both.

The individuals that become involved in cybercrime often have a skill set that could be put to a positive use.

Skills in coding, gaming, computer programming, cyber security or anything IT-related are in high demand and there are many careers and opportunities available to anyone with an interest in these areas.

(See a YouTube advertisement for Webstresser. Courtesy of Webstresser Proof and YouTube. Posted on  Feb 11, 2017)