Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
عملية PowerOFF: ضربة دولية كاتشد 53 دومين ديال DDoS وتكشف على 3 مليون حساب
Operation PowerOFF: International Strike Seizes 53 DDoS Domains and Exposes 3 Million Accounts
TL;DR
A massive international law enforcement effort, Operation PowerOFF, has successfully seized 53 DDoS-for-hire domains, arrested four individuals, and gained access to databases containing over 3 million criminal user accounts. The operation, spanning 21 countries, aims to dismantle the infrastructure of "booter" services that allow even non-technical users to launch devastating cyberattacks.
In one of the most significant blows to the DDoS-for-hire ecosystem to date, law enforcement agencies from around the globe have joined forces under Operation PowerOFF. This coordinated strike has not only shuttered dozens of malicious domains but has also provided authorities with a massive cache of data on the individuals who use these services to disrupt digital infrastructure.
The Scope of the Takedown
The operation resulted in the seizure of 53 domains associated with commercial distributed denial-of-service (DDoS) operations. These services—frequently marketed as "stressers" or "booters"—were reportedly utilized by more than 75,000 cybercriminals to target websites, servers, and networks globally.
Beyond the digital seizures, the human element of these operations was targeted as well:
- Four individuals have been arrested in connection with the services.
- 25 search warrants have been issued.
- Access was obtained to databases containing more than 3 million criminal user accounts.
Authorities are now leveraging this data to send warning emails and letters to identified users, signaling that anonymity in the booter market is a thing of the past.
A Global Coalition
The success of Operation PowerOFF underscores the importance of international cooperation in fighting borderless cybercrime. A total of 21 countries participated in the action, including:
- Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Poland, Portugal, Sweden, Thailand, the U.K., and the U.S.
Europol emphasized that by seizing this technical infrastructure—including servers and databases—authorities have effectively hindered criminal operations and prevented further damage to potential victims.
The Rise of DDoS-for-Hire
"Booter" services have lowered the barrier to entry for cybercrime. As Europol noted, these services allow individuals with little to no technical expertise to execute large-scale attacks. While some users are driven by simple curiosity or financial extortion, others use these tools for hacktivism or to sabotage business competitors.
To evade law enforcement, many of these providers attempt to frame their activities as legitimate "stress-testing" tools for network administrators. However, the legal reality is clear: launching unauthorized traffic to disrupt a service is a criminal act.
Parallel Actions by the U.S. Department of Justice
In a related announcement, the U.S. Department of Justice (DoJ) revealed it has seized domains associated with eight leading DDoS Internet of Things (IoT) botnet services. Key seized domains include:
- vacstresser[.]net
- mythicalstress[.]com
These specific sites claimed to launch thousands of attacks daily. Visitors to these URLs are now met with a law enforcement seizure banner warning that "DDoS attacks are illegal" and that users of such services are subject to investigation and prosecution.
To further combat the trend, the U.S. has also launched an advertising campaign intended to deter potential buyers searching for DDoS services online.
Conclusion
Operation PowerOFF represents a continuing evolution in how law enforcement handles the DDoS-for-hire market. By shifting from reactive defense to proactive infrastructure seizure and data collection, authorities are making it increasingly difficult for "booter" operators and their customers to operate in the shadows. With 3 million accounts now in the hands of police, the ripple effects of this operation are likely to be felt for years to come.
Source: https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html


