Operation Royal Flush: Feds seize cache of malicious domains

US authorities have seized a group of domain names linked to illegal and malicious activities.

Operation Royal Flush is the name of the latest domain seizure operated by the department of Homeland Security Investigations, in accordance with a seizure warrant issued by the US Court for the Eastern District of Virginia.

Judging from the domains involved, the unlawful activities involved criminal copyright infringement and fraudulent removal of copyright notices, most likely pirating software. These domains are now displaying an image informing visitors of the domain seizure that took place.

Here is the list of domains seized during “Operation Royal Flush:”

 

 

agazud.com
anbush.com
asasyz.com
aualadin.com
ausija.com
charismaticilok.com
citrixworkspacers.com
cordlessvision.com
denialallowance.com
entertainok.com
flopsale.net
footballreviews.net
fregiyu.com
freshuper.com
fudupdate.com
gaswert.com
generalimaps.com
gutenupdate.com
jquerysslles.com
kiritektower.com
molibdenstructure.com
msdnupdate.com
msdupdate.com
msoftupdate.com
myflop.net
newslimitless.com
newsmach.com
onestepstar.com
rancorhealth.com
reebons.com
sajij.com
secsslwin.com
softsupdate.com
stakerelease.com
workadvancer.com
xaxej.com
zbignef.com
zominoz.com

Copyright © 2024 DomainGang.com · All Rights Reserved.

Comments

One Response to “Operation Royal Flush: Feds seize cache of malicious domains”
  1. gastro entestine says:

    They shared the same backend IP as breached.vc

Leave a Reply

Your email address will not be published. Required fields are marked *

 characters available