Dutch Police Took Down 15 DDoS-For-Hire Services

FBI Seizes 15 Domains Selling DDoS Services

Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are still many problems to be solved. According to a recent statement issued by the Dutch law enforcement agency, 15 DDoS (distributed denial of service) websites have been shut down in the past week. The Dutch police said they collaborated with Europol, Interpol, the Federal Bureau of Investigation (FBI), hosting service providers and registrars to remove the threat website.

Some of these sites will restart the new domain name, the police said they are ready to respond to this immediately. In addition to taking action, the police also arrested people related to the DDoS attacks on official information access and file portals MijnOveheid.nl and Overheid.nl targeting US citizens. By March 19, 2020, these sites were bombarded with junk data traffic. At the critical moment of the COVID-19 outbreak, citizens could not access them.

The police claimed that most of the DDoS attacks that occurred were carried out by young people who were bored or were looking for challenges. Then, they enjoyed the propaganda of their behavior and felt that they had made remarkable achievements. However, there is no age-related mitigating factor in this behavior, because during periods such as the ongoing coronavirus pandemic, disrupting the availability of critical websites is extremely destructive to companies and organizations and poses risks to many people. This is why the FBI, Interpol, and Europol are all involved in dealing with this issue because they all agree on its importance. If an actor manages to cancel your online service through DDoS, they may also steal data and access your backend and factory load. The only way to prevent these catastrophic attacks is to take appropriate security measures against them.

The LIFARS New York City Lab was established in collaboration with the FBI, Department of Homeland Security and US Secret Service to address all forms of cybercrime including ransomware, cyber extortion, celebrity hacking, Facebook hacking, insider threats, Twitter hacking, Gmail hacking and more. For mission-critical systems, the LIFARS Incident Response Team is deployed to the local enterprise environment. The LIFARS digital forensics process then laterally engages in affected systems and potentially compromised endpoints in the network with high speed and precision. Our mission is to minimize the threat surface, minimize the extent of the compromise, and minimize the damage associated with the cyber attack. Our network forensics process leverages our in-depth expertise from our highly advanced digital forensics investigations, combined with IoCs and TTP from our proprietary knowledge base.

  • Forensics and Digital Investigations
  • Mobile Forensics
  • Memory Forensics
  • Network Forensics

LIFARS developed advancements in malware analysis and blockchain forensics to combat the hacking of bitcoin wallets. When fraudulent bitcoin payment is made, it is often is processed by “cryptocurrency mixer,” which splits the transaction into fragments and reassembles them at the end. New methods for blockchain transaction analysis were developed and tested in the LIFARS Computer Forensics New York Laboratory when LIFARS was investigating a real case of stolen bitcoins valued close to 70 million USD.

 

 

Contact LIFARS Immediately For
Mitigating Cyber Risks in Your Organization