Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Posted on May 7, 2025May 9, 2025 By CWS No Comments on Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Might 07, 2025Ravie LakshmananDark Net / Cybercrime
Europol has introduced the takedown of distributed denial of service (DDoS)-for-hire companies that had been used to launch hundreds of cyber-attacks internationally.
In reference to the operation, Polish authorities have arrested 4 people and the USA has seized 9 domains which might be related to the now-defunct platforms.
“The suspects are believed to be behind six separate stresser/booter companies that enabled paying clients to flood web sites and servers with malicious site visitors — knocking them offline for as little as EUR 10,” Europol stated in an announcement.
The companies, named cfxapi, cfxsecurity, neostress, jetstress, quickdown and zapcut, are stated to have been instrumental in launching widespread assaults on colleges, authorities companies, companies, and gaming platforms between 2022 and 2025.

Europol stated the platforms supplied “slick person interfaces,” enabling malicious actors with little to no technical experience to orchestrate DDoS assaults by merely coming into a goal IP tackle, selecting the kind of assault, and paying a price.
Stresser companies, sometimes marketed on underground boards, are sometimes disguised as professional stress-testing instruments however are designed to disrupt entry to internet assets by letting their clients unleash a flood of faux site visitors in opposition to a goal website, making them inaccessible to actual customers.
“Not like conventional botnets, which require the management of huge numbers of contaminated units, stresser/booter companies industrialise DDoS assaults by centralised, rented infrastructure,” Europol famous.
QuickDown Pricing Plans as of July 15, 2024
In keeping with snapshots captured on the Web Archive, cfxsecurity, hosted on the domains cfxsecurity[.]guess and “cfxsecurity.cc,” marketed itself because the “#1 stress testing service” and that it offered “complete stress check, making certain your web site and companies are able to climate any storm.”
The service supplied three plans, Starter for $20/month, Premium for $50/month, and Enterprise for $130/month. QuickDown (“quickdown[.]professional”), likewise, priced its package for wherever between $20/month to $379/month.

Cloud safety firm Radware, in a report revealed in August 2024, revealed that QuickDown is amongst a brand new crop of stresser companies which have adopted a hybrid structure combining each botnets and devoted servers. QuickDown is alleged to have launched a “Botnet addon and new plans associated to the Botnet community” in September 2023.
The newest motion, carried out in collaboration with Dutch and German authorities, is a part of an ongoing effort known as Operation PowerOFF that goals to dismantle infrastructure facilitating DDoS-for-hire exercise.
In December 2024, a set of 27 stresser companies had been taken offline, alongside saying prices in opposition to six totally different people within the Netherlands and the U.S.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, DDoSforHire, Europol, Global, Services, Shuts

Post navigation

Previous Post: OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
Next Post: New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA

Related Posts

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers The Hacker News
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware The Hacker News
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed The Hacker News
Why DNS Security Is Your First Defense Against Cyber Attacks? The Hacker News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News