
The coordinated action week, launched on April 13, 2026, involved law enforcement agencies from 21 countries targeting the growing ecosystem of “booter” services.
Authorities confirmed that over 75,000 warning emails and letters were issued to individuals identified as users of DDoS-for-hire platforms.
The operation also resulted in four arrests, 25 search warrants, and the takedown of 53 domains associated with illegal attack infrastructure.
Participating countries included the United States, United Kingdom, Germany, Japan, Australia, Brazil, and several EU member states, highlighting the global scale of the operation.
The enforcement effort focused heavily on dismantling booter services platforms that allow users to launch DDoS attacks with minimal technical knowledge.
These services rely on backend infrastructure such as servers, databases, and automation tools to execute attacks against websites, networks, and online services.
During preparatory “operational sprints,” investigators seized key infrastructure and accessed databases containing more than 3 million user accounts.
Europol analysts processed this data to identify suspects and support coordinated enforcement actions across multiple jurisdictions.
By disrupting this infrastructure, authorities significantly reduced the ability of threat actors to launch attacks and prevented further harm to businesses and critical services.
Growing Threat of DDoS-for-Hire
DDoS-for-hire services remain one of the most accessible forms of cybercrime. Individuals with little to no technical expertise can execute attacks by following simple online tutorials or purchasing services for a small fee.
Motivations behind these attacks vary widely:
- Financial gain through extortion or service disruption
- Hacktivism driven by ideological causes
- Personal curiosity or experimentation
- Competitive sabotage targeting rival services
Targets often include online marketplaces, telecom providers, and web platforms, with attacks typically focused within regional boundaries.
As Operation PowerOFF transitions into its prevention phase, authorities are expanding efforts to deter future offenders.
Key initiatives include:
- Search engine ads warn users about the illegality of DDoS tools
- Removal of over 100 URLs promoting booter services
- Blockchain-based warning messages targeting crypto transactions linked to attacks
- Updates to the official Operation PowerOFF website for transparency and awareness
These measures aim to reduce demand for DDoS services, particularly among younger users who may not fully understand the legal consequences.
Europol’s Role and Global Coordination
Europol played a central role by analyzing seized data, providing forensic and crypto-tracing support, and coordinating intelligence sharing across participating countries.
The agency also established a command post during the action phase and supported ongoing investigations.
The operation was conducted under the EMPACT framework, which strengthens international cooperation against organized cybercrime.
Operation PowerOFF continues as a long-term initiative, signaling that global law enforcement agencies are intensifying efforts to dismantle cybercrime infrastructure and hold both operators and users accountable.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Operation PowerOFF Takes Down 75,000 DDoS Attackers and 50+ Service Domains appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
