Tuesday , September 10 2024

Law Enforcement Lures Cybercriminals With Fake DDoS Services

That booter website you just paid $100 to launch a distributed denial-of-service attack – are you sure it’s not a front for the cops?

No, of course it’s not. Wait, is it? The National Crime Agency in Britain says it is running multiple, real-looking cybercrime service sites designed to identify suspects at home and abroad. But you’re not falling for it. Are you?

Hacker to exploite GeoServer Vulnerability to Deploy Malware

Researchers at Fortinet unveiled hackers to exploit GeoServer RCE vulnerability deploying malware relating to the vulnerability tracked as “CVE-2024-36401, has...
Read More
Hacker to exploite GeoServer Vulnerability to Deploy Malware

IMB unveils multiple vulnerabilities in it’s webMethods Integration

Multiple vulnerabilities have been published by IBM in its webMethods Integration Server which cloud allow attackers to execute arbitrary commands...
Read More
IMB unveils multiple vulnerabilities in it’s webMethods Integration

Progress LoadMaster exposed to a critical 10/10 vulnerability

Progress Software released an emergency fix for a critical vulnerability (10/10) in its Loadmaster and LoadMaster Multi-Tenant Hypervisor products, which...
Read More
Progress LoadMaster exposed to a critical 10/10 vulnerability

Cisco released security updates for two critical security flaws

CISCO released security updates for two critical security flaws impacting its smart Licensing Utility that could allow unauthenticated, remote attackers...
Read More
Cisco released security updates for two critical security flaws

OpenBAS: Cutting-edge breach and attack simulation platform

OpenBAS is a platform that helps organizations to plan, schedule, and conduct crisis exercises, adversary simulations, and breach simulations. OpenBAS...
Read More
OpenBAS: Cutting-edge breach and attack simulation platform

Critical Security Flaws Patched in Zyxel Networking Devices

Zyxel has released software updates to fix a serious security issue in certain access point (AP) and security router versions....
Read More
Critical Security Flaws Patched in Zyxel Networking Devices

CVE-2024-38811: CEV In VMware Fusion Unveiled

VMware released a security advisory for a major vulnerability in the VMware Fusion product. This vulnerability could be exploited by...
Read More
CVE-2024-38811: CEV In VMware Fusion Unveiled

CERT-IN Warns Vulnerabilities in Palo Alto Networks applications

Indian Computer Emergency Response Team (CERT-IN) issued advisories about multiple vulnerabilities in various Palo Alto Networks applications. Attackers could exploit...
Read More
CERT-IN Warns Vulnerabilities in Palo Alto Networks applications

How Malaysia’s Data Centre Industry Poised for Growth

Malaysia is quickly becoming a leading choice for investing in data centers. It aims to generate RM3.6 billion (US$781 million)...
Read More
How Malaysia’s Data Centre Industry Poised for Growth

RansomHub exfiltrated data over 210 victims: US alert

US authorities have issued a cybersecurity advisory about a ransomware group called RansomHub. The group is thought to have stolen data...
Read More
RansomHub exfiltrated data over 210 victims: US alert

That’s the mind game the U.K. counterpart to the FBI is after among the clientele of DDoS-for-hire, aka stresser/booter, services. These offer a simple, easy-to-use interface via which users can sign up, pay for credit and then order disruptions of specific websites, all in just a few minutes.

How many sites the NCA is running and what it offers aren’t exactly clear – a ploy at the heart of this newly disclosed effort, part of Operation PowerOff. Authorities say it’s designed to sow confusion and doubt and undermine trust in the criminal market. Paranoia, they hope, runs deep.

Call it an escalation in the never-ending fight against booter sites, which allow individuals with little technical ability to easily commit cybercrimes.

“Booter/stresser services are like grass: You can mow the lawn, but the grass will grow back,” Daniel Smith, head of research for cybersecurity firm Radware’s threat intelligence division, told me. “The problem with enforcement is the reaction. As law enforcement worldwide steps up their efforts to reduce crime, the criminals will escalate in lockstep, as there is too much profit involved in cybercrime for everyone to be scared away.”

Fostering uncertainty among customers is another way to attempt to reduce the proliferation of booter sites. Here’s what the NCA has confirmed: It’s running multiple fake booter websites “which have so far been accessed by around several thousand people.”

“Users based in the U.K. will be contacted by the National Crime Agency or police and warned about engaging in cybercrime. Information relating to those based overseas is being passed to international law enforcement,” the agency says.

Last December, the FBI, together with the NCA, Dutch police and Europol, collectively shuttered 48 big booter sites. One site alone is tied to more than 30 million attacks.

These services can pose a risk to public safety. “Such attacks have the potential to cause significant harm to businesses and critical national infrastructure and often prevent people from accessing essential public services,” the NCA said (see: Hacktivist Pleads ‘Not Guilty’ in Children’s Hospital DDoS Attack).

Individuals can always, of course, build their own botnet to launch DDoS attacks. Booter websites are a shortcut past that time-consuming and technically intensive task, often taken by low-level would-be hackers who might actually pause over disclosing payment card details if they thought police could be on the other side.

DDoS-for-hire services typically offer attractive price points, oftentimes “for as little as $30 per month,” DDoS mitigation firm Cloudflare reports. “The more you pay, the larger and longer of an attack you’re going to get.”

Behind the scenes, real stresser services can rely on several different strategies to fuel their disruptions. “Most booter/stresser services are powered by a combination of botnets comprised of IoT devices and cloud services as well as servers that allow spoofing, enabling operators to offer a wide variety of attack vectors to their clients,” Smith said.

Check Also

The content is written by Muhibbul Muktadir Tanim.

Cyber Resilience: Elevating Bangladesh’s Corporate Culture Safeguard

Bangladesh’s use of technology in the digital era brings up a major challenge in cybersecurity. …

Leave a Reply

Your email address will not be published. Required fields are marked *