Feds Seize 48 DDoS-for-Hire Domains, Charge Six Individuals

Operators of DDoS-for-hire websites marketed themselves as “booter” or “stressor” services, i.e., to stress-test the underlying bandwidth.

December 16, 2022

This week, the U.S. Department of Justice (DoJ) authorized the FBI to take down 48 domains engaged in distributed denial-of-service (DDoS) attacks. Law enforcement agencies are also charging six defendants responsible for operating DDoS booter services.

The Department of Justice’s press release states these 48 websites were a front for launching millions of DDoS attacksOpens a new window globally. Europol addedOpens a new window that one of these sites was used to carry out more than 30 million DDoS attacks. Operators of these websites marketed themselves as “booter” or “stressor” services, i.e., to stress-test the underlying bandwidth.

However, an investigation revealed that these 48 websites were actually carrying out DDoS-for-hire operations to enable any technically unskilled and paying user to ‘boot’ a target off the internet. DDoS attacks generally involve requesting overwhelming traffic from websites, thereby knocking them off.

After reviewing the communication between site administrators and customers, the feds discovered malice, which indicated “that both parties are aware that the customer is not attempting to attack their own computers.”

The websites in question have been used to target educational institutions, government agencies, gaming platforms and millions of individuals in exchange for money paid in cryptocurrency. “Some sites use the term ‘stresser’ in an effort to suggest that the service could be used to test the resilience of one’s own infrastructure,” noted FBI special agent Elliott Peterson in an affidavit.

“However… I believe this is a façade and that these services exist to conduct DDoS attacks on victim computers not controlled by the attacker, and without the authorization of the victim.”

See More: C2-as-a-Service Portal Dark Utilities Now Boasts Over 3,000 Criminal Subscribers

Besides the FBI, the law enforcement action, dubbed Operation PowerOFF, also involved participation from the U.K.’s National Crime Agency, the Netherlands Police, Europol, and the Brandon Police Service of Canada which resulted in the seizure of the following websites:

Seized DDoS Websites Posing as Stresser Services

anonboot.com

ipstress.org stresser.is blackstresser.net
api-sky.xyz ipstress.vip stresser.net/stresser.org

ipstresser.com

astrostress.com

ipstresser.wtf stresser.one ipstresser.us
booter.sx orphicsecurityteam.com stresser.so

stresser.shop

booter.vip

ovhstresser.com stresser.top exotic-booter.com
brrsecurity.org quantum-stresser.net supremesecurityteam.com

mcstorm.io

buuter.cc

redstresser.cc truesecurityservices.io United States France Namecheap 1 nightmarestresser.com
cyberstress.us royalstresser.com vdos-s.co

shock-stresser.com

dragonstresser.com

silentstress.net zerostresser.com stresserai.com
dreams-stresser.io stresser.app ipstresser.xyz

sunstresser.com

freestresser.so

stresser.best kraysec.com bootyou.net
instant-stresser.com stresser.gg securityteam.io

defconpro.net

The six individuals arrested and charged include John M. Dobbs (32, Honolulu, HI), Joshua Laing (32, of Liverpool, NY), Jeremiah Sam Evans aka “John The Dev” (23, San Antonio, TX), Angel Manuel Colon Jr. “Anonghost720” and “Anonghost1337,” (37, Belleview, FL), Shamar Shattock (19, of Margate, FL), and Cory Anthony Palmer (22, of Lauderhill, FL).

Shattock and Palmer were charged with allegedly running respective booter services, while Miller, Colon Jr., Dobbs, and Liang were charged with conspiracy to violate the computer fraud and abuse act along with running booter services.

All six defendants are expected to appear before a court in early 2023. “Each defendant allegedly operated at least one website that offered one-stop DDoS services and subscriptions of various lengths and attack volumes,” the DoJ press release readsOpens a new window . “In each of these criminal cases, the FBI posed as a customer and conducted test attacks to confirm that the booter site functioned as advertised.”

The U.S. government’s previous action against DDoS-for-hire services includes the takedown of 15 domains.

Let us know if you enjoyed reading this news on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!

Image source: Shutterstock

MORE ON CYBERATTACKS

Sumeet Wadhwani
Sumeet Wadhwani

Asst. Editor, Spiceworks Ziff Davis

An earnest copywriter at heart, Sumeet is what you'd call a jack of all trades, rather techs. A self-proclaimed 'half-engineer', he dropped out of Computer Engineering to answer his creative calling pertaining to all things digital. He now writes what techies engineer. As a technology editor and writer for News and Feature articles on Spiceworks (formerly Toolbox), Sumeet covers a broad range of topics from cybersecurity, cloud, AI, emerging tech innovation, hardware, semiconductors, et al. Sumeet compounds his geopolitical interests with cartophilia and antiquarianism, not to mention the economics of current world affairs. He bleeds Blue for Chelsea and Team India! To share quotes or your inputs for stories, please get in touch on sumeet_wadhwani@swzd.com
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.