• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
europol shuts down six ddos for hire services used in global attacks

Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

You are here: Home / General Cyber Security News / Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks
May 7, 2025

Europol has announced the takedown of distributed denial of service (DDoS)-for-hire services that were used to launch thousands of cyber-attacks across the world.

In connection with the operation, Polish authorities have arrested four individuals and the United States has seized nine domains that are associated with the now-defunct platforms.

“The suspects are believed to be behind six separate stresser/booter services that enabled paying customers to flood websites and servers with malicious traffic — knocking them offline for as little as EUR 10,” Europol said in a statement.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The services, named cfxapi, cfxsecurity, neostress, jetstress, quickdown and zapcut, are said to have been instrumental in launching widespread attacks on schools, government services, businesses, and gaming platforms between 2022 and 2025.

Cybersecurity

Europol said the platforms offered “slick user interfaces,” enabling malicious actors with little to no technical expertise to orchestrate DDoS attacks by simply entering a target IP address, choosing the type of attack, and paying a fee.

Stresser services, typically advertised on underground forums, are often disguised as legitimate stress-testing tools but are designed to disrupt access to web resources by letting their customers unleash a flood of fake traffic against a target site, making them inaccessible to real users.

“Unlike traditional botnets, which require the control of large numbers of infected devices, stresser/booter services industrialise DDoS attacks through centralised, rented infrastructure,” Europol noted.

QuickDown Pricing Plans as of July 15, 2024

According to snapshots captured on the Internet Archive, cfxsecurity, hosted on the domains cfxsecurity[.]bet and “cfxsecurity.cc,” marketed itself as the “#1 stress testing service” and that it provided “comprehensive stress test, ensuring your website and services are ready to weather any storm.”

The service offered three plans, Starter for $20/month, Premium for $50/month, and Enterprise for $130/month. QuickDown (“quickdown[.]pro”), likewise, priced its kit for anywhere between $20/month to $379/month.

Cybersecurity

Cloud security company Radware, in a report published in August 2024, revealed that QuickDown is among a new crop of stresser services that have adopted a hybrid architecture combining both botnets and dedicated servers. QuickDown is said to have introduced a “Botnet addon and new plans related to the Botnet network” in September 2023.

The latest action, conducted in collaboration with Dutch and German authorities, is part of an ongoing effort called Operation PowerOFF that aims to dismantle infrastructure facilitating DDoS-for-hire activity.

In December 2024, a set of 27 stresser services were taken offline, alongside announcing charges against six different individuals in the Netherlands and the U.S.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «ottokit wordpress plugin with 100k+ installs hit by exploits targeting OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
Next Post: Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT cisco patches cve 2025 20188 (10.0 cvss) in ios xe that enables»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.