In the last phase of the international operation known as Operation PowerOFF, the authorities have sent warnings to more than 75,000 people who had resorted to platforms that rent power to launch distributed service denial attacks (DDoS). This coordinated intervention, supported by Europol it covers 21 countries and combines police actions, technical infrastructure closures and public awareness measures.
During the operation, arrests, search warrants and the disconnection of a number of domains linked to these illegal services were recorded: in particular, law enforcement officials arrested several persons, issued dozens of court orders and removed more than half a hundred domain names that facilitated attacks. These figures respond to a strategy that is no longer only reactive to incorporate phases to deter and prevent future abuses.

Behind the "booter" or "stresser" business is a simple and dangerous scheme: They sell attacks on demand and rent botnets - networks of infected devices, often routers and cameras connected to the Internet of Things - to saturate and leave out of service web pages and online services. Suppliers often hide under the excuse of "load testing" or "stress testing," but the absence of control over the ownership of the target makes that offer a tool for unlawful acts.
The operation does not come out of nothing: it is supported in previous phases in which the authorities managed to locate and confiscate massive databases with accounts used for crime, which now allows both to identify users and to make it difficult to reactivate these platforms. Europol has pointed out that, in addition to technical and judicial blows, the campaign now enters a phase of prevention that uses communication tactics and the blocking of recruitment channels.
Among the measures announced are the placement of ads in search engines for young people looking for tools to mount DDoS, the removal of hundreds of web addresses that promote these services and the insertion of notices in transactions related to illicit payments in block chains. The idea is to attack the contact points: that the offer will no longer be visible and that those who are tempted will receive information about the legal and technical risks before acting.
It is important to understand what a DDoS attack implies: by flooding a server with malicious traffic, legitimate user access is interrupted and significant economic and reputational damage can be caused. For those who operate a "booter" or who charge the attack, in addition to technical responsibility, there are increasing legal consequences as international investigations coordinate and share evidence.
Global cooperation is key in these cases because infrastructure and victims are often in different jurisdictions. The latest phase of PowerOFF included countries of the European Union and others such as Australia, Thailand, the United States, the United Kingdom, Japan and Brazil, reflecting the cross-border nature of cybercrime. Only through the rapid exchange of intelligence and the coordination of actions can criminal networks operating on a global scale be deactivated.
If you are interested in deepening how these attacks work and why they are so difficult to combat from a technical point of view, there are clear and informative explanations from specialized sources. For example, cloud protection services and incident response equipment describe how malicious traffic overloads resources and how to mitigate such vectors; a good technical summary is available in the documentation of security providers such as Cloudflare. For the European regulatory and response context, the work of Europol and national incident response teams can be followed in their official communications, such as the above-mentioned press release Europol.
In addition to criminal sanctions, there is a practical cost to users: participating in these services may involve the exposure of personal data, the use of traceable accounts and means of payment and the loss of access to platforms. The campaigns of the preventive phase seek precisely to make this risk visible and to offer legal alternatives: if a company needs to assess the resistance of its systems, there are authorized suppliers and procedures of load tests that require explicit permits and a professional methodology.
For victims and operators of critical infrastructure, the recommendation is to strengthen defence measures and prepare response plans. The exchange of information between operators, the use of anti-DDoS services and network segmentation are practices that reduce impact. Internet authorities and service providers can also apply blockages and leaks to neutralize on-line attacks.

Operation PowerOFF shows that combined pressure - technical, legal and communicative - can weaken the DDoS market on demand. However, the threat does not go away: botnets are recycled, operators change platform and users looking for shortcuts still exist. For this reason, the strategy now pursued combines point blows with education and reduction of the commercial visibility of these services.
If someone is considering using such a platform or has received a warning, it should be taken seriously: in addition to the ethical implications, the legal ones can include from charges for computer damage to confiscation of equipment. For more information on recent research and actions, see Europol's official note and the coverage of specialized means that have followed the development of Operation PowerOFF, for example in Europol and in technical journalistic analysis such as the one published by BleepingComputer.
In short, this is a two-way lesson: digital sovereignty requires a coordinated response to those who market cyberweapons, and at the same time calls for an informed citizen who understands that "evidence" without permission is not harmless. Technology can protect us or be used to attack us; the difference is marked by the rules, the surveillance and the responsibility of each actor.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...