Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
嗯,用户让我用中文总结一下这篇文章的内容,控制在100个字以内。不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要仔细阅读文章,抓住关键点。 文章讲的是一个国际执法行动,代号Operation PowerOFF,打击DDoS服务。他们关停了53个域名,逮捕了4人。这些服务被超过7.5万名网络犯罪分子使用。行动涉及21个国家,查获了300多万个犯罪账户,并发出了警告邮件和25份搜查令。 接下来,我需要把这些信息浓缩到100字以内。要突出国际执法、关停域名、逮捕人数、涉及国家数量以及查获的账户数量。同时,提到DDoS服务如何被滥用以及执法机构的努力。 可能的结构是:国际执法行动代号PowerOFF打击DDoS服务,关停53域名逮捕4人,涉及21国查获300万账户,并警告犯罪分子。这样既简洁又涵盖了主要内容。 </think> 国际执法行动代号"PowerOFF"打击商业DDoS服务,关停53个域名并逮捕4人。该行动涉及21个国家,查获超300万个犯罪账户,并向涉案人员发出警告邮件和25份搜查令。 2026-4-17 05:46:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals.

The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to databases containing over 3 million criminal user accounts. Authorities are also sending warning emails and letters to the identified criminal users, and 25 search warrants have been issued.

As many as 21 countries participated in the action: Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Poland, Portugal, Sweden, Thailand, the U.K., and the U.S.

"Booter services allow users to launch DDoS attacks against targeted websites, servers, or networks," Europol said in a statement. "Their infrastructure is made up of servers, databases, and other technical components that make DDoS-for-hire activities possible. By seizing these infrastructures, authorities were able to hinder these criminal operations and prevent further damage to victims."

The agency described DDoS-for-hire as one of the most prolific and easily accessible trends in cybercrime, as it allows even individuals with little to no technical knowledge to execute malicious attacks at scale and inflict significant damage to busin

Europol also noted that DDoS activity can originate from well-resourced and skilled threat actors, who could rely on such services to customize or optimize their illicit activities. DDoS attacks often tend to target various web-based services, with the motivations behind them as varied as they are broad.

This ranges from simple curiosity and financial gain through extortion to hacktivism driven by ideological reasons and disruption of competitors' services. Some operators of these services have been found to mask their true motives and escape law enforcement scrutiny by disguising them as stress-testing tools.

The development marks the latest step taken by authorities to dismantle criminal DDoS-for-hire infrastructures worldwide as part of PowerOFF. In August 2025, the U.S. government announced the takedown of a DDoS botnet called RapperBot that was used to conduct large-scale disruptive attacks targeting victims in over 80 countries since at least 2021.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html
如有侵权请联系:admin#unsafe.sh