To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment. Read More
Related Posts
Identifying suspicious credential usage
Identifying suspicious credential usage
How NCSC guidance can help organisations detect and protect themselves from credential abuse. Read More
Authorities Seized Platform Used For Paid DDoS
Authorities Seized Platform Used For Paid DDoS
[[{“value”:”
On April 17, 2024, a joint effort between the Dresden Public Prosecutor’s Office and the Cybercrime Competence Center of the Saxony State Criminal Police Office, in collaboration with a U.S. investigative agency, won significantly in the ongoing battle against cybercrime.
The operation, aptly named “PowerOFF,” successfully dismantled a criminal online platform in Germany and abroad.
This platform had been facilitating the sale of destructive Distributed Denial of Service (DDoS) attacks to willing buyers.
DDoS attacks are a nasty form of cyber assault. In these attacks, hackers flood a target server or network with overwhelming requests.
The sheer magnitude of incoming traffic saturates the system, rendering it temporarily or permanently unavailable to legitimate users.
Document
Integrate ANY.RUN in Your Company for Effective Malware Analysis
Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:
Real-time Detection
Interactive Malware Analysis
Easy to Learn by New Security Team members
Get detailed reports with maximum data
Set Up Virtual Machine in Linux & all Windows OS Versions
Interact with Malware Safely
If you want to test all these features now with completely free access to the sandbox:
Users could purchase DDoS attacks using cryptocurrencies, effectively renting the services of digital mercenaries.
These attackers would then unleash a barrage of requests, overwhelming the targeted website or service.
The consequences were severe: websites would become inaccessible, businesses would suffer financial losses, and users would be left frustrated.
The Saxon Police Incident
On September 28th, 2023, the Saxon police department’s website was subjected to a relentless Distributed Denial of Service (DDoS) attack.
Acquired via the criminal platform, the assault temporarily rendered the police website unavailable.
Fortunately, no sensitive data belonging to individuals or companies was compromised during this half-hour siege. Global Collaboration and IT Infrastructure Takedown
“PowerOFF” represents a coordinated international effort. Key players include:
In a joint effort to combat cybercrime, U.S. law enforcement agencies partnered with their European counterparts to identify and neutralize a significant threat.
The European Union Agency for Law Enforcement Cooperation, or Europol, was crucial in coordinating efforts across borders.
The German Federal Criminal Police Office lent their expertise to the operation, while the Dutch National Police Corps worked tirelessly to track down the platform’s operators.
The United Kingdom’s National Crime Agency also played a significant role in the investigation. Poland’s cybercrime experts joined forces to dismantle the criminal infrastructure.
Although the platform is no longer operational, the pursuit of its operators continues as law enforcement agencies remain vigilant in the fight against cybercrime.
Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo
The post Authorities Seized Platform Used For Paid DDoS appeared first on Cyber Security News.
“}]] Read More
Cyber Security News
Ransomware gangs now abuse Microsoft Azure tool for data theft
Ransomware gangs now abuse Microsoft Azure tool for data theft
Ransomware gangs like BianLian and Rhysida increasingly use Microsoft’s Azure Storage Explorer and AzCopy to steal data from breached networks and store it in Azure Blob storage. […] Read More