Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Posted on May 7, 2025May 9, 2025 By CWS No Comments on Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Might 07, 2025Ravie LakshmananDark Net / Cybercrime
Europol has introduced the takedown of distributed denial of service (DDoS)-for-hire companies that had been used to launch hundreds of cyber-attacks internationally.
In reference to the operation, Polish authorities have arrested 4 people and the USA has seized 9 domains which might be related to the now-defunct platforms.
“The suspects are believed to be behind six separate stresser/booter companies that enabled paying clients to flood web sites and servers with malicious site visitors — knocking them offline for as little as EUR 10,” Europol stated in an announcement.
The companies, named cfxapi, cfxsecurity, neostress, jetstress, quickdown and zapcut, are stated to have been instrumental in launching widespread assaults on colleges, authorities companies, companies, and gaming platforms between 2022 and 2025.

Europol stated the platforms supplied “slick person interfaces,” enabling malicious actors with little to no technical experience to orchestrate DDoS assaults by merely coming into a goal IP tackle, selecting the kind of assault, and paying a price.
Stresser companies, sometimes marketed on underground boards, are sometimes disguised as professional stress-testing instruments however are designed to disrupt entry to internet assets by letting their clients unleash a flood of faux site visitors in opposition to a goal website, making them inaccessible to actual customers.
“Not like conventional botnets, which require the management of huge numbers of contaminated units, stresser/booter companies industrialise DDoS assaults by centralised, rented infrastructure,” Europol famous.
QuickDown Pricing Plans as of July 15, 2024
In keeping with snapshots captured on the Web Archive, cfxsecurity, hosted on the domains cfxsecurity[.]guess and “cfxsecurity.cc,” marketed itself because the “#1 stress testing service” and that it offered “complete stress check, making certain your web site and companies are able to climate any storm.”
The service supplied three plans, Starter for $20/month, Premium for $50/month, and Enterprise for $130/month. QuickDown (“quickdown[.]professional”), likewise, priced its package for wherever between $20/month to $379/month.

Cloud safety firm Radware, in a report revealed in August 2024, revealed that QuickDown is amongst a brand new crop of stresser companies which have adopted a hybrid structure combining each botnets and devoted servers. QuickDown is alleged to have launched a “Botnet addon and new plans associated to the Botnet community” in September 2023.
The newest motion, carried out in collaboration with Dutch and German authorities, is a part of an ongoing effort known as Operation PowerOFF that goals to dismantle infrastructure facilitating DDoS-for-hire exercise.
In December 2024, a set of 27 stresser companies had been taken offline, alongside saying prices in opposition to six totally different people within the Netherlands and the U.S.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, DDoSforHire, Europol, Global, Services, Shuts

Post navigation

Previous Post: OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
Next Post: New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA

Related Posts

OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN The Hacker News
A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News