[TheRecord] Dutch police send warning letters to customers of DDoS booter service

Dutch police have taken a rare step this week and sent letters to 29 individuals who used a now-defunct DDoS-for-hire service —also known as a DDoS booter— to launch DDoS attacks against various targets.

In the letters, Dutch officials warned users that they’d been added to a database of past miscreants, and any involvement in new DDoS attacks will lead to a criminal case. 

We have registered you in our system and you will now receive a final warning. If similar incidents occur in the future, we will prosecute. In that case, take into account a conviction, criminal record and the loss of your computer and/or laptop. 

Dutch Police

The letters were sent to 29 Dutch nationals who registered accounts on the MineSearch.rip portal [archived], which Dutch authorities seized and took down in July 2020.

The investigation, started after a complaint from a gaming company, linked the site to two 19-year-old teenagers from Spijkenisse and Winschoten, both of whom were detained and had their computer equipment seized.

Today, Dutch police said they analyzed the seized data, and instead of starting criminal procedures against the site’s users, they’ve decided to give the 29 suspects one more chance.

The post Dutch police send warning letters to customers of DDoS booter service appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[SecurityWeek] Cybersecurity M&A Roundup: 37 Deals Announced in June 2021

All posts, Security Week

A total of 37 cybersecurity-related acquisitions and mergers were announced in June 2021. read more Source: Read More (SecurityWeek RSS Feed)

Read More

Daily NCSC-FI news followup 2019-06-12

Kyberhyökkääjä iski Lahden kaupungin verkkoon haittaohjelma ehti saastuttaa tietokoneita yle.fi/uutiset/3-10827423 Lahden kaupungin verkkoon ja työasemiin kohdistui kyberhyökkäys tiistaina iltapäivällä. Hyökkäyksen seurauksena verkko kuormittui ja ohjelma ehti saastuttaa koneita. Haittaohjelma on tunnistettu, ja virustorjuntaohjelmisto eristää sen tartunnan saaneissa koneissa, , kertoo kaupunki tiedotteessaan. Operaattorin palomuureissa on havaittu haittaohjelmaan liittyviä yhteysavauksia ja verkkoliikennettä, joka on estetty.. Myös: […]

Read More

[BleepingComputer] Public Windows PrintNightmare 0-day exploit allows domain takeover

Technical details and proof-of-concept (PoC) exploit have been accidentally leaked for a currently unpatched vulnerability in Windows that allows remote code execution. […] Source: Read More (BleepingComputer)

Read More