top of page

Operation PowerOFF Seized 53 DDoS-for-Hire Domains. 75,000 Criminals Used Them. The Infrastructure Class Is What Matters.

  • Writer: Patrick Duggan
    Patrick Duggan
  • 10 minutes ago
  • 3 min read

International law enforcement announced Operation PowerOFF this week: 53 domains seized, 4 arrests, and a user base of more than 75,000 cybercriminals who paid for commercial DDoS-for-hire services — "booter" and "stresser" platforms that let anyone with a credit card take down a website, a gaming server, or a small business.


The takedown is real. The infrastructure is gone. The arrests will produce intelligence that feeds the next operation.


But the story that matters isn't the 53 domains. It's the infrastructure class they represent.





What DDoS-for-Hire Actually Looks Like


Booter/stresser services are the commodity tier of cybercrime. You don't need to know how to code. You don't need a botnet. You don't need to understand amplification vectors or reflection attacks. You visit a website that looks like a SaaS product — pricing tiers, API documentation, customer support — and you pay $20-50 to point a firehose at a target for 10 minutes.


The infrastructure behind these services is a constellation of:


  • Frontend domains (the 53 that got seized — the storefronts)

  • Backend attack infrastructure (the actual servers generating traffic — often bulletproof hosting in jurisdictions that don't cooperate with Europol)

  • Payment processing (crypto, mostly — occasionally PayPal or Stripe with layers of laundering)

  • Customer databases (the 75,000 users — now in law enforcement hands)

  • Upstream bandwidth providers (the ISPs and transit providers whose networks the attack traffic traverses)

Seizing the frontend domains is necessary and insufficient. The backend infrastructure rotates. The payment methods adapt. The customer base fragments and reconstitutes on new platforms within weeks.


This is the same lifecycle we track with Pattern 38 (supply chain attacks), Pattern 39 (fork farms), and our domain watchdog system monitoring 16 adversary domains under daily DNS surveillance. Different threat type, same infrastructure physics.





What Law Enforcement Got Right


The customer database. 75,000 users identified means 75,000 people who now know that law enforcement has their payment records, their target lists, and their login histories. The deterrence effect of "we know who you are" is worth more than any domain seizure.


The timing. Operation PowerOFF is the latest in a series of DDoS takedowns (the name has been used across multiple operations since 2018). Each iteration captures more infrastructure intelligence that feeds the next. The operations are compounding.


The coordination. This wasn't one agency. International LEO coordination across multiple jurisdictions is the only way to hit services that span continents.





What Matters For Threat Intelligence Consumers


If you operate a network that's been targeted by DDoS — and at some point, most internet-facing services are — the Operation PowerOFF seizures give you two things:


First: a list of domains to check against your logs. The seized domains haven't been fully published yet, but as they're released through Europol and FBI channels, cross-reference them against your DNS logs and netflow data. Any hit means someone was using a booter service to research or target your infrastructure.


Second: the infrastructure class as a detection model. Booter platforms share common patterns: short-lived domains, bulletproof hosting, cryptocurrency payment endpoints, API structures that accept target IP + duration + attack type as parameters. These patterns are detectable at the network level before law enforcement acts.


Our IOC index carries URL-based indicators from URLhaus and SSLBL that overlap with the booter/stresser ecosystem — malware downloaders, C2 callbacks, and infrastructure used in DDoS campaigns. The specific 53 seized domains will enter our index as they're published. The infrastructure class has been in the index for months.





The Bigger Picture


75,000 users. That's not 75,000 sophisticated hackers. That's 75,000 people — teenagers, disgruntled employees, business competitors, gamers with grudges — who paid $20 to take something offline.


The commoditization of attack infrastructure is the story of the last decade in cybersecurity. DDoS-for-hire. Ransomware-as-a-service. Initial access brokers. Phishing kits with customer support. The barrier to entry for causing real damage has collapsed to the price of a restaurant meal.


Operation PowerOFF removes 53 storefronts. By next month there will be 53 new ones. The whack-a-mole dynamic is permanent. What changes it is the intelligence — the customer databases, the payment trails, the infrastructure fingerprints that make the next operation faster and the next prosecution easier.


That's also what a threat intelligence feed does at scale. Not whack-a-mole on individual domains, but pattern recognition across infrastructure classes that lets defenders block the next storefront before law enforcement gets to it.


We index 1.08 million indicators. 6.7 million autonomous scoring decisions. 16 adversary domains under daily DNS watch. The 53 seized PowerOFF domains will join the index. The pattern they represent was already there.


— Patrick





bottom of page