HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Operation PowerOFF Takes Down 53 DDoS‑For‑Hire Domains, Exposes 3 Million Criminal Accounts

Operation PowerOFF, a coordinated international law‑enforcement effort, seized 53 DDoS‑for‑hire domains and accessed databases containing over 3 million criminal user accounts. The takedown curtails a major source of DDoS attacks and raises the risk profile for third‑party vendors that could be targeted by boot‑service actors.

🛡️ LiveThreat™ Intelligence · 📅 April 17, 2026· 📰 securityaffairs.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
3 recommended
📰
Source
securityaffairs.com

Operation PowerOFF Takes Down 53 DDoS‑For‑Hire Domains, Exposes 3 Million Criminal Accounts

What Happened – International law‑enforcement agencies coordinated Operation PowerOFF, seizing 53 domains that offered DDoS‑for‑hire services and arresting four suspects. The takedown gave authorities access to databases containing more than 3 million user accounts linked to over 75 000 criminal operators.

Why It Matters for TPRM

  • DDoS‑for‑hire platforms are a common supply‑chain threat that can be leveraged against third‑party vendors and their customers.
  • Exposure of millions of criminal accounts highlights the scale of the underground market and the likelihood of repeat attacks.
  • Ongoing enforcement and awareness campaigns increase the risk profile for organizations that rely on external hosting or SaaS services without robust DDoS mitigation.

Who Is Affected – Technology‑SaaS providers, cloud hosting services, telecommunications carriers, financial services, e‑commerce platforms, and any organization that could be a target of DDoS extortion.

Recommended Actions – Review your DDoS protection contracts, validate that vendors employ scrubbing services and traffic‑filtering controls, and update incident‑response playbooks to include boot‑service abuse scenarios.

Technical Notes – The operation targeted boot‑service infrastructure (command‑and‑control servers, payment gateways, and user databases). No specific software vulnerability was disclosed; the threat vector was the illicit third‑party service model itself. Data types accessed included usernames, email addresses, payment details, and attack logs. Source: SecurityAffairs

📰 Original Source
https://securityaffairs.com/190932/cyber-crime/operation-poweroff-53-ddos-domains-seized-and-3-million-criminal-accounts-uncovered.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.