Europol launches Operation PowerOFF — warns 75,000 DDoS users and takes down 53 domains
Four people were also arrested as part of the campaign
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
You are now subscribed
Your newsletter sign-up was successful
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
- Europol Operation PowerOFF disrupts DDoS‑for‑hire services across 21 countries
- Four arrests, 53 domains seized, 25 search warrants executed
- Police found 3 million criminal accounts; 75,000 warning emails sent to deter customers
Four people have been arrested during Operation PowerOFF, a new Europol campaign aimed at disrupting Distributed Denial of Service (DDoS) service providers.
Europol announced that together with 21 national law enforcement agencies, it launched Operation PowerOFF which, besides the four arrests, also led to the takedown of 53 domains and the issuing of 25 search warrants.
“Leading up to the action week, a series of operational sprints took place gathering experts from national authorities across the globe to carry out actions against high-value target users of DDoS-for-hire platforms and raise awareness about the illegality of these activities,” Europol said.
Article continues belowWarning the users
During these “sprints”, the police allegedly disrupted illegal booter services, dismantling the technical infrastructure that supports DDoS services - servers, databases, and other technical components.
“By seizing these infrastructures, authorities were able to hinder these criminal operations and prevent further damage to victims,” Europol added.
On the confiscated hardware, the police found information on three million criminal user accounts, which led to a series of coordinated actions across the globe.
In the next stage of the campaign, Europol is warning DDoS-for-hire customers to stop what they’re doing or face the consequences. It apparently said 75,000 warning emails, and placed ads on search engines to target people searching for DDoS-for-hire tools on Google.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
More than 100 URLs advertising DDoS-for-hire services were removed from search engine results, and warning messages were sent on blockchains criminals use to make illegal payments.
To launch a distributed denial of service attack, a cybercriminal must have access to hundreds of thousands of internet-connected devices. Those offering these services usually first compromise poorly protected hardware, such as home routers, smart TVs, DVRs, and different smart home appliances, with malware.
This malware gives them the necessary access, which they later streamline by creating a simple dashboard. Then, they rent access to the dashboard, effectively facilitating cybercrime.

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.