Articles tagged "DDoS"

Found 38 articles

Law enforcement agencies from 21 countries have successfully dismantled 53 domains linked to DDoS-for-hire services. This coordinated action aimed to disrupt operations that allow individuals or groups to launch distributed denial-of-service attacks on targeted websites, effectively overwhelming them with traffic. DDoS attacks can cripple businesses, disrupt services, and lead to significant financial losses. By targeting these domains, authorities are sending a strong message against cybercriminal activities and attempting to reduce the availability of these illicit services. This operation reflects a growing international effort to combat online crime and protect organizations from such disruptive attacks.

Impact: DDoS-for-hire services
Remediation: N/A
Read Original

Operation PowerOFF is an international law enforcement initiative that has successfully dismantled 53 domains linked to commercial distributed denial-of-service (DDoS) services. This operation led to the arrest of four individuals and exposed over 3 million accounts belonging to cybercriminals. These DDoS-for-hire services were reportedly utilized by more than 75,000 users, highlighting the scale of the issue. By disrupting access to these services and taking down their supporting infrastructure, authorities aim to reduce the prevalence of DDoS attacks, which can severely impact businesses and online services. The operation is part of a broader effort to combat cybercrime and enhance online security.

Impact: DDoS-for-hire services, cybercriminal accounts
Remediation: N/A
Read Original

On April 13, 2026, law enforcement agencies conducted 'Operation PowerOFF,' which successfully identified 75,000 users involved in distributed denial-of-service (DDoS) attacks across 21 countries. The operation led to the takedown of 53 domains associated with these attacks. By targeting the DDoS ecosystem, authorities aim to disrupt the infrastructure that enables these types of cyberattacks, which can overwhelm websites and online services, causing significant downtime and financial losses. This operation is a crucial step in combating the growing threat of DDoS attacks, which have become increasingly sophisticated and harmful to businesses and individuals alike. The large number of identified users highlights the scale of the issue and underscores the need for ongoing vigilance in cybersecurity efforts.

Impact: DDoS attack services, related online platforms, 53 identified domains
Remediation: N/A
Read Original

In a recent operation dubbed PowerOFF, authorities seized 53 domains linked to DDoS-for-hire services, aiming to disrupt the activities of over 75,000 suspected cybercriminals. These services allow individuals to pay for attacks that overwhelm targeted websites and networks with excessive traffic, causing disruptions and downtime. The crackdown is part of a broader effort to combat cybercrime and reduce the prevalence of these harmful services. Officials have issued warnings to the involved individuals, urging them to cease their activities. This operation highlights ongoing concerns about the accessibility of DDoS attacks and the need for stronger measures to protect online infrastructure.

Impact: DDoS-for-hire services, targeted websites, and networks
Remediation: N/A
Read Original

A report from Qrator Labs has revealed a significant increase in a DDoS botnet, which has now ballooned to 13.5 million compromised devices over the past year. The majority of these devices are located in the United States, Brazil, and India. This surge in botnet size has enabled attackers to launch unprecedented distributed denial-of-service attacks, reaching up to 2 terabits per second. The fintech and betting industries appear to be the primary targets of these assaults. This situation raises alarms for businesses in these sectors, as the sheer scale of attacks could disrupt services and lead to substantial financial losses.

Impact: Fintech and betting industries
Remediation: Companies should enhance their DDoS mitigation strategies, implement traffic filtering, and consider using cloud-based DDoS protection services.
Read Original
13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent report from Qrator Labs indicates that the largest known DDoS botnet has expanded to encompass 13.5 million devices. This massive botnet is capable of launching Distributed Denial of Service (DDoS) attacks reaching up to 2 terabits per second. The primary target of these attacks has been the financial technology sector, raising concerns for companies in that space. With such a vast number of devices potentially under the control of attackers, the threat to both service availability and data security is significant. Companies in the FinTech sector, as well as other industries relying on online services, need to bolster their defenses to mitigate the risks associated with these powerful DDoS attacks.

Impact: FinTech companies and online services reliant on uninterrupted access.
Remediation: Companies should implement advanced DDoS protection measures and traffic filtering solutions.
Read Original
Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand

Hackread – Cybersecurity News, Data Breaches, AI and More

A German national, suspected of being a key figure in the DDoS-for-hire scene, was arrested in Thailand. This individual is believed to be the mastermind behind services like Fluxstress and Neldowner, which have been used to launch distributed denial-of-service (DDoS) attacks globally. His arrest marks a significant step in combating online cybercrime, particularly as DDoS attacks continue to disrupt businesses and services across various sectors. The operation he led allowed users to pay for attacks that could overwhelm targets, causing significant downtime and financial losses. His capture may deter others from engaging in similar illegal activities and could lead to further investigations into the networks supporting these services.

Impact: N/A
Remediation: N/A
Read Original

The Masjesu botnet, also referred to as XorBot, has emerged as a stealthy DDoS-for-hire service that primarily targets Internet of Things (IoT) devices. Unlike many other botnets, Masjesu avoids high-profile targets, such as Department of Defense IP addresses, opting instead for less conspicuous victims. This botnet employs XOR encryption to maintain low visibility and ensure its persistence within compromised systems. As the use of IoT devices continues to rise, the potential for such botnets to disrupt services and cause damage increases, making it crucial for users and organizations to secure their devices against such threats. The activity of Masjesu raises concerns about the growing sophistication of DDoS services that are accessible for hire, which can have widespread implications for network stability and security.

Impact: IoT devices, specifically those vulnerable to DDoS attacks
Remediation: Users should regularly update their IoT devices, change default passwords, and implement network security measures to protect against unauthorized access.
Read Original

Rostelecom, a major state-run telecommunications company in Russia, reported a significant distributed denial-of-service (DDoS) attack on Monday. This incident disrupted internet access, government services, and online banking for users in 30 cities across the country. The attackers behind the DDoS attack have not yet been identified. This incident is concerning as it affects essential services, highlighting vulnerabilities in critical infrastructure that could have broader implications for national security and public safety. The scale of the attack raises questions about the resilience of state-run systems against cyber threats.

Impact: Internet access, government services, online banking in 30 cities across Russia.
Remediation: N/A
Read Original

The U.S. Justice Department, in collaboration with international law enforcement agencies, has successfully disrupted four Internet of Things (IoT) botnets responsible for massive distributed denial-of-service (DDoS) attacks. These attacks peaked at an astonishing 30 terabits per second, marking them as some of the largest ever recorded. The coordinated effort involved shutting down the infrastructure that allowed these botnets to operate, which had been harnessing compromised IoT devices to flood networks with traffic. This disruption is significant as it not only diminishes the threat of future attacks from these specific botnets but also sends a strong message about the vulnerabilities present in IoT devices. Users and manufacturers alike are reminded of the importance of securing their devices against potential exploitation.

Impact: IoT devices, including smart home appliances and security cameras
Remediation: Users should secure their IoT devices by changing default passwords, keeping firmware updated, and disabling unnecessary features.
Read Original

Akamai's latest security report reveals that internet-facing systems are facing increasing levels of malicious traffic, particularly targeting APIs, web applications, and DDoS channels. From January 2024 to December 2025, the number of web attacks aimed at applications and APIs has steadily risen, indicating a growing threat to organizations that rely on these technologies. This uptick in malicious activity suggests that attackers are honing their skills and strategies, making it crucial for companies to enhance their security measures. As APIs become more integral to business operations, understanding and mitigating these risks is essential for protecting sensitive data and maintaining service availability. Organizations should prioritize monitoring and defending their API infrastructures to counter these persistent threats.

Impact: APIs, web applications
Remediation: Organizations should enhance security measures for APIs and web applications, including monitoring traffic and implementing robust security protocols.
Read Original

Security researchers have identified two new malware strains specifically targeting Linux-based network devices. These malicious programs are being used by financially motivated cybercriminals, marking a shift from their previous association with nation-state espionage. The malware can facilitate distributed denial-of-service (DDoS) attacks and enable unauthorized cryptocurrency mining. This development is concerning as it indicates that attackers are now exploiting vulnerabilities that were once primarily used for geopolitical purposes. Organizations using Linux network devices need to be vigilant and enhance their security measures to protect against these evolving threats.

Impact: Linux-based network devices
Remediation: Organizations should enhance security measures on Linux network devices, including regular updates and monitoring for unusual activity.
Read Original

Akamai has issued a warning about a new wave of cyberattacks that combine Layer 7 DDoS attacks, API abuse, and AI-driven tactics. These coordinated assaults are becoming more sophisticated and are increasingly difficult for organizations to detect and defend against. The blending of these attack vectors means that traditional defenses may not be sufficient, putting many companies at risk. As attackers enhance their methods, it's crucial for businesses to stay informed and adapt their security strategies accordingly. This trend could affect a wide range of industries, making it essential for companies to prioritize their cybersecurity measures.

Impact: Layer 7 DDoS attacks, API services
Remediation: Companies should enhance their monitoring and detection capabilities, implement rate limiting for APIs, and regularly update their security protocols to address evolving threats.
Read Original

In November 2025, a massive DDoS attack reached a peak of 31.4 terabits per second, making it one of the largest ever recorded. The attack was executed by the AISURU/Kimwolf botnet and lasted for just 35 seconds. Fortunately, Cloudflare's security systems were able to automatically detect and block the attack before it could cause significant disruption. This incident is part of a worrying trend of increasingly powerful and brief DDoS attacks that can overwhelm even the most robust defenses. Organizations must remain vigilant as such attacks not only threaten individual services but also have the potential to disrupt broader internet infrastructure.

Impact: Cloudflare services, AISURU/Kimwolf botnet
Remediation: N/A
Read Original

The AISURU/Kimwolf botnet has launched a massive DDoS attack that peaked at an astonishing 31.4 Terabits per second, lasting just 35 seconds. This attack is part of a growing trend of extremely high-volume HTTP DDoS assaults that the botnet has been executing throughout the fourth quarter of 2025. Cloudflare, a cybersecurity company that monitors these incidents, successfully detected and mitigated the attack, preventing potential disruptions to online services. Such high-capacity attacks pose significant risks to internet infrastructure and can overwhelm even the most fortified systems, affecting businesses and users alike. As these types of attacks become more common, organizations need to bolster their defenses against DDoS threats.

Impact: Web services, online businesses, internet infrastructure
Remediation: Implement DDoS mitigation strategies, enhance network security measures, and utilize traffic filtering solutions.
Read Original
Page 1 of 3Next