FBI Seizes Three Domains Used To Sell Stolen Data

June 2, 2022

The FBI and the U.S. Department of Justice have announced the seizure of three domains used to sell stolen data. These domains were also used to provide DDoS attack services.

The three domains include WeLeakInfo.to, ipstress.in and ovh-booter.com. The domains were seized following a joint law enforcement operation in coordination with the National Police Corps of the Netherlands and the Belgian Federal Police.

WeLeakInfo.to sold subscriptions that allow its customers to search a database containing information stolen in more than 10,000 data breaches. Ipstress.in and ovh-booter.com provide clients with booter or stressor attack services for DDoS attacks.

The raid also led to the arrest of a suspect, the seizure of server infrastructure and searches at several locations.

“Today, the FBI and the Department stopped two distressingly common threats: websites trafficking in stolen personal information, and sites which attack and disrupt legitimate internet businesses. Cyber crime often crosses national borders. Using strong working relationships with our international law enforcement partners, we will address crimes like these that threaten privacy, security, and commerce around the globe,” said U.S. Attorney Matthew M. Graves.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn