{"id":45502,"date":"2026-04-17T06:27:58","date_gmt":"2026-04-16T22:27:58","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains\/"},"modified":"2026-04-17T06:27:58","modified_gmt":"2026-04-16T22:27:58","slug":"operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains\/","title":{"rendered":"Operation PowerOFF identifies 75k DDoS users, takes down 53 domains"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2022\/04\/11\/Europol_headpic.jpg\" width=\"1600\" alt=\"Operation PowerOFF identifies 75k DDoS users, takes down 53 domains\"><\/p>\n<p>More than 75,000 individuals using distributed denial-of-service (DDoS) platforms for disruptive attacks have been warned through emails and letters during the latest phase of the Operation PowerOFF international law enforcement action.<\/p>\n<p>The ongoing operation is supported by Europol and involves authorities in 21 countries. Coordinated efforts led to the arrest of four people, taking offline 53 domains, and issuing 25 search warrants.<\/p>\n<p>&ldquo;Leading up to the action week, a series of operational sprints took place, gathering experts from national authorities across the globe to carry out actions against high-value target users of DDoS-for-hire platforms and raise awareness about the illegality of these activities,&rdquo; <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/europol-supported-global-operation-targets-over-75-000-users-engaged-in-ddos-attacks\" rel=\"nofollow noopener\">Europol says<\/a>.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Operation PowerOFF identifies 75k DDoS users, takes down 53 domains\"><\/a> <\/div>\n<p>&ldquo;During these sprints, the participating countries disrupted illegal booter services, dismantling the technical infrastructure that supports illegal DDoS.&rdquo;<\/p>\n<p>The operation has a global span, and includes multiple European Union countries as well as Australia, Thailand, the United States, the United Kingdom, Japan, and Brazil.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"496\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/map.jpg\" width=\"900\" alt=\"Operation PowerOFF identifies 75k DDoS users, takes down 53 domains\"><figcaption><strong>Latest Operation PowerOFF reach<\/strong><br \/><em>Source: Europol<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&ldquo;Booter services&rdquo; are DDoS-for-hire platforms that allow users to pay for renting the firepower of DDoS swarms, typically consisting of compromised routers and IoTs, and directing it to their intended targets.<\/p>\n<p>Some operators of these services attempt to hide their real goal by claiming they are used for legitimate stress testing, but lack verification of target ownership and hence are still used for illegal attacks.<\/p>\n<p>The latest Operation PowerOFF action was built on <a href=\"https:\/\/www.bleepingcomputer.com\/tag\/operation-poweroff\/\" rel=\"nofollow noopener\">previous phases<\/a> that resulted in dismantling key infrastructure and seizing databases with more than 3 million criminal accounts.<\/p>\n<p>Europol states that the operation is now entering its prevention phase, which includes launching awareness campaigns and disruption measures.<\/p>\n<p>These involve placing search engine ads aimed at young people seeking DDoS tools, removing from search results more than 100 URLs that promote these illegal services, and adding on-chain warning messages tied to illicit payments.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 220px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/autonomous-validation2.jpg\" alt=\"Operation PowerOFF identifies 75k DDoS users, takes down 53 domains\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored\">99% of What Mythos Found Is Still Unpatched.<\/a><\/h2>\n<p>AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.<\/p>\n<p>At the Autonomous Validation Summit (May 12 &amp; 14), see how autonomous, context-rich validation finds what&#8217;s exploitable, proves controls hold, and closes the remediation loop.<\/p>\n<p>          <button><a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored\">Claim Your Spot<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/aisuru-kimwolf-jackskid-and-mossad-botnets-disrupted-in-joint-action\/\">International joint action disrupts world&rsquo;s largest DDoS botnets<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/interpol-operation-synergia-takes-down-1-300-servers-used-for-cybercrime\/\">Interpol operation Synergia takes down 1,300 servers used for cybercrime<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41\/\">Interpol disrupts cybercrime activity on 22,000 IP addresses, arrests 41<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/police-crackdown-on-the-com-cybercrime-gang-leads-to-30-arrests\/\">Europol-led crackdown on The Com hackers leads to 30 arrests<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/spain-arrests-suspected-anonymous-fenix-hacktivists-for-ddosing-govt-sites\/\">Spain arrests suspected hacktivists for DDoSing govt sites<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>More than 75,000 individuals using distributed denial-o [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45502","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45502"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45502\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}