Thursday, January 27, 2022 Busted

The nightmare week for Demonoid has barely achieved a immense crescendo, with intelligence coming out of Ukraine that following a massive DDoS assault the site has now been compromised by local authorities. Those seeking a U.S. connection to the raid will not be let down – a informant in the country’s Interior Ministry alleges that the action was scheduled to coincide with Deputy Prime Minister Valery Khoroshkovsky’s trip to the United States.

ColoCall is the biggest datacenter in Ukraine and a place that has been Demonoid’s place in recent years. But in the midst of last week, in the aftermath of the DDoS attack, government investigators arrived at ColoCall to close Demonoid down.
“Investigators have copied all the information from the servers Demonoid and sealed them,” an anonymous ColoCall source confirmed. “Some equipment was not seized, but now it does not work, and we were forced to terminate the agreement with the site.”

But while Demonoid’s servers are in custody, the site’s admin does not appear to be. The ColoCall source would not say who is behind the site, only that its management is located in Mexico.

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

FBI in possession of 411 Million facial recognition photos

Privacy specialists are disputing this week the FBI, which keeps a massive – and apparently …