Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Posted on May 7, 2025May 9, 2025 By CWS No Comments on Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Might 07, 2025Ravie LakshmananDark Net / Cybercrime
Europol has introduced the takedown of distributed denial of service (DDoS)-for-hire companies that had been used to launch hundreds of cyber-attacks internationally.
In reference to the operation, Polish authorities have arrested 4 people and the USA has seized 9 domains which might be related to the now-defunct platforms.
“The suspects are believed to be behind six separate stresser/booter companies that enabled paying clients to flood web sites and servers with malicious site visitors — knocking them offline for as little as EUR 10,” Europol stated in an announcement.
The companies, named cfxapi, cfxsecurity, neostress, jetstress, quickdown and zapcut, are stated to have been instrumental in launching widespread assaults on colleges, authorities companies, companies, and gaming platforms between 2022 and 2025.

Europol stated the platforms supplied “slick person interfaces,” enabling malicious actors with little to no technical experience to orchestrate DDoS assaults by merely coming into a goal IP tackle, selecting the kind of assault, and paying a price.
Stresser companies, sometimes marketed on underground boards, are sometimes disguised as professional stress-testing instruments however are designed to disrupt entry to internet assets by letting their clients unleash a flood of faux site visitors in opposition to a goal website, making them inaccessible to actual customers.
“Not like conventional botnets, which require the management of huge numbers of contaminated units, stresser/booter companies industrialise DDoS assaults by centralised, rented infrastructure,” Europol famous.
QuickDown Pricing Plans as of July 15, 2024
In keeping with snapshots captured on the Web Archive, cfxsecurity, hosted on the domains cfxsecurity[.]guess and “cfxsecurity.cc,” marketed itself because the “#1 stress testing service” and that it offered “complete stress check, making certain your web site and companies are able to climate any storm.”
The service supplied three plans, Starter for $20/month, Premium for $50/month, and Enterprise for $130/month. QuickDown (“quickdown[.]professional”), likewise, priced its package for wherever between $20/month to $379/month.

Cloud safety firm Radware, in a report revealed in August 2024, revealed that QuickDown is amongst a brand new crop of stresser companies which have adopted a hybrid structure combining each botnets and devoted servers. QuickDown is alleged to have launched a “Botnet addon and new plans associated to the Botnet community” in September 2023.
The newest motion, carried out in collaboration with Dutch and German authorities, is a part of an ongoing effort known as Operation PowerOFF that goals to dismantle infrastructure facilitating DDoS-for-hire exercise.
In December 2024, a set of 27 stresser companies had been taken offline, alongside saying prices in opposition to six totally different people within the Netherlands and the U.S.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, DDoSforHire, Europol, Global, Services, Shuts

Post navigation

Previous Post: OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
Next Post: New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA

Related Posts

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data The Hacker News
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users The Hacker News
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures The Hacker News
Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT The Hacker News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News