The authorities in Germany have reported the disruption of a criminal service known as dstat[.]cc, which facilitated the launching of distributed denial-of-service (DDoS) attacks by other malicious actors.
“The platform allowed a broad spectrum of users, including those with limited technical know-how, to carry out DDoS attacks,” stated the Federal Criminal Police Office (Bundeskriminalamt or BKA) in a recent announcement.
“In recent police investigations, the employment of stresser services for executing DDoS attacks has gained prominence.”
The BKA described dstat[.]cc as a platform that provided guidance and assessments of stresser services to carry out DDoS attacks on specific websites, rendering them unresponsive.
Based on an alert issued by Radware, dstat[.]cc enabled botnet owners to evaluate the capacity and capabilities of their DDoS attack services.
“Bot herders utilize DStat platforms for testing and showcasing the effectiveness of their botnet, booter, or script on various targets, whether protected or not,” the company explained.
Simultaneously, two individuals aged 19 and 28 have been apprehended in Darmstadt and the Rhein-Lahn regions. They are also charged with providing illegal infrastructure for the distribution of substantial quantities of narcotics.
They are specifically accused of promoting and vending designer drugs and liquids containing synthetic cannabinoids through an online platform named “Flight RCS” accessible on the clearnet.
The dismantling of dstat[.]cc is part of an ongoing collaborative law enforcement operation named PowerOFF, resulting in the shutdown of several DDoS-for-hire platforms like digitalstress[.]su and Anonymous Sudan in recent times.


