DDoS by subscription: how Sudan's shadow business worked

Man

Professional
Messages
3,067
Reaction score
598
Points
113
The end of the Anonymous Sudan era has revealed Sudan's trace on the global web.

Recently, the US Department of Justice accused two Sudanese citizens of organizing cyberattacks and announced measures to eliminate the Anonymous Sudan group, also known as LameDuck. The group, according to Cloudflare, carried out thousands of DDoS attacks, disrupting the operation of many sites and services around the world.

The LameDuck group, using its own cloud network "Skynet Botnet", organized more than 35,000 DDoS attacks in a year - from January 2023 to March 2024. At the same time, the hackers sold their services "on demand", serving more than 100 customers. In addition to political motives, the attacks were also financial in nature, as members of the group demanded ransom from victims to stop the attacks.

Experts noted that LameDuck's actions often coincided with political events and were aimed at well-known companies and government organizations. For example, the attacks affected sectors such as transportation, telecommunications, banks, government agencies, and the media. Among the most notable attacks are DDoS strikes on Israeli, Swedish, and Ukrainian organizations.

Basically, the group operated under anti-Western and pro-Islamic slogans, drawing attention to its actions on social networks and offering its services to other hacktivists. The indictment confirmed that the leaders of the group are Sudanese nationals.

Cloudflare warns that the LameDuck group did not use a standard botnet of infected devices, but rented cloud servers, which increased the power of the attacks and made tracking more difficult. The use of proxy servers and third-party resources helped the group hide its activities.

To protect against such threats, Cloudflare recommends that companies use always-on DDoS protection solutions, configure WAFs, and limit the rate of requests to their resources. Such measures help reduce the impact of attacks and protect critical systems from overload.

Source
 
Top