Operation PowerOFF Targets 75,000 DDoS-for-Hire Users Worldwide
Severity: High (Score: 61.7)
Sources: Thecyberexpress, www.cloudflare.com, Technadu, Gbhackers, cybernoz.com
Summary
On April 13, 2026, a coordinated international law enforcement operation named 'Operation PowerOFF' targeted the DDoS-for-hire ecosystem, resulting in the takedown of 53 domains and the arrest of four individuals. Authorities from 21 countries collaborated to send warning emails to over 75,000 suspected users of DDoS services, which allow individuals to launch attacks without technical expertise. The operation revealed more than 3 million user accounts linked to these services, highlighting the scale of the issue. DDoS attacks, which overwhelm websites with excessive traffic, have been increasingly prevalent, particularly during ongoing geopolitical conflicts. The crackdown is part of a broader initiative to disrupt illegal cyber activities and raise awareness about the legal consequences of using such services. The operation also included the issuance of 25 warrants and the removal of over 100 URLs promoting DDoS-for-hire services from search engine results. Authorities aim to deter future attacks through education and enforcement. Key Points: • Operation PowerOFF involved 21 countries and targeted over 75,000 DDoS-for-hire users. • 53 domains were seized, and four arrests were made during the operation. • DDoS attacks are increasingly used for harassment, extortion, and disruption amid geopolitical tensions.
Key Entities
- DDoS (attack_type)
- Operation PowerOFF (campaign)
- PowerOFF (campaign)
- Airbnb (company)
- Amazon (company)
- CNN (company)
- Dell (company)
- Deutsche Bahn (company)
- EBay (platform)
- GitHub (platform)
- Visa (platform)
- HTTP/2 (platform)
- Memcached (platform)
- Australia (country)
- Austria (country)
- Belgium (country)
- Brazil (country)
- Britain (country)
- Financial (industry)
- Government (industry)
- Telecommunications (industry)
- Mirai (malware)
- Google Cloud (tool)
- Mythical Stress (tool)
- Vac Stresser (tool)
- HTTP/2 Rapid Reset (vulnerability)