-
U.S. authorities seized eight DDoS-for-hire domains, including “Mythical Stress” and “Vac Stresser”, which together claimed to launch tens of thousands of attacks daily.
-
A new ad campaign by HSI, DCIS, and Netherlands Police now targets people searching for DDoS services, warning them of the legal consequences.
-
Over the past four years, more than 11 defendants have been charged and over 100 domains seized in connection with DDoS-for-hire operations.

Federal officials in the US have dealt a major blow to cybercriminals who sell internet-flooding attacks.
The U.S. Justice Department announced court-approved actions on April 16, targeting some of the world’s leading DDoS-for-hire services.
These are the same services that have knocked schools, government agencies, and even military resources offline.
Details of Major Takedowns
In Alaska, authorities seized eight domains linked to powerful attack tools. Two of the most notable are “Vac Stresser” and “Mythical Stress.” Each site allegedly launched tens of thousands of DDoS attacks per day. Investigators also searched backend servers used to run these operations.
DDoS attacks work by flooding computers or servers with junk information. That flood blocks real users from getting online. The Justice Department calls these services “booter” services because they offer a low barrier to entry. With a few dollars, anyone can rent a botnet and start unleashing attacks on victims.
They targeted a number of sectors, schools, gaming platforms, and government agencies too. Critical infrastructure was also among their list of targets. Surprisingly, they’ve targeted Department of War resources as well. Also, a lot of regular folks got hit too, making them unable to access the internet for hours, even days at a time.
A Cleverly Planned Global Operation Against Cybercrime
This crackdown is part of Operation PowerOFF, a long-running international effort. They teamed up with many other agencies across the border. EUROPOL helped. The FBI’s Anchorage Field Office was part of it.
Also, Germany’s BKA lend their resources. Netherlands Police, Japan’s National Police Agency, and France’s Police Nationale, among many others, were involved in the operation.
This takedown of DDoS-for-hire services follows another major FBI operation, the FBI recently seized a dark web domain tied to a $28 million bank account hijacking scheme, demonstrating that federal authorities are aggressively targeting cybercriminal infrastructure across multiple crime categories, from DDoS attacks to financial fraud.
The goal? To dismantle criminal DDoS infrastructure all over the world and bring the operators to book.
The operation has already racked up results. Over the past four years, authorities have charged more than 11 defendants in Anchorage and Los Angeles. In addition, they’ve seized more than 100 DDoS-related domains.
But the new twist is an advertising campaign. Homeland Security Investigations (HSI), the Department of War’s Defense Criminal Investigative Service (DCIS), and the Netherlands Police are now buying search engine ads.
These ads pop up when someone searches for DDoS keywords. Instead of finding a hire service, potential criminals see a warning. The goal is to deter cybercriminals and educate the public about the illegality of DDoS activities.
The Way Forward
“Criminal DDoS-for-hire services impact internet services for victims across the country, including Alaska,” said U.S. Attorney Michael J. Heyman. Also, he stated that fighting against these attacks to secure critical infrastructure requires both domestic and international collaboration.
Special Agent Kenneth DeChellis, leader of the DCIS Cyber Field Office, noted that the announcement reflects continued partnership with the private sector. “DDoS is a clear threat to the Department,” he said, “and will continue to be a target of our investigative efforts.”
Private companies also pitched in. Akamai, Cloudflare, Amazon Web Services, Digital Ocean, Epieos, PayPal, Google, Hydrolix, Registrar of Last Resort, The ShadowServer Foundation, the University of Cambridge, and Unit 221B all provided assistance.
Assistant U.S. Attorney Adam Alexander in Alaska is prosecuting the case. For more details on DDoS harm, the FBI’s Anchorage Field Office has published additional information online.