Anonymous Sudan Attack London Internet Facility

Anonymous Sudan, a Russian-affiliated hacktivist group, has threatened a big cyber attack against the UK in response to air attacks in Yemen and support of Israel. According to recent updates on Telegram, the group claimed it has conducted an attack on the London Internet Exchange (LINX), an 850 member mutual routing and infrastructure organisation.

“Big attack on UK soon, in response to the air attacks in Yemen and unconditional support of the genocidal zionist regime Israel,” Anonymous Sudan wrote on its Telegram page on 13 January. Although, to date, the hackvist group's claim has not been verified.

Anonymous Sudan first came to notice at the beginning of 2023, and they are a very “loud” hacktivist entity attacking both anti-Russian targets and those with a pro- Islamic agenda. They are considered to be  a conglomerate of hackers from different origins and ideologies that collaborate to take down websites typically using DDoS methods and tools.

The Anomymous Sudan group has been consistently active over Telegram and warned about their potential attacks before they happened and near real time updates on the attacks as they are carried out. Their attacks are happening every week somewhere around the world, and have  proved capable of taking down websites of governments, banks, large enterprises, airports amongst other.  

DDOS attacks are significant in terms of consumer usage, because you can’t get into a website, but it’s not a sophisticated attack. That means it can be carried out by anyone who can get access to the tools that enable numerous requests to a single website (such as bots farms). 

The hackers analyse the bandwidth, capacity, of the websites they target by sending a certain amount of requests at the same time, and they ramp up until the point they see it collapses. This specific group is notorious for using very robust DDoS tools, with strong connections to Russian hacking groups who are currently leveraging these tools in their own attacks. 

DDoS attacks can be prevented. It’s a matter of resources and risk management.  The more you invest in the ability to monitor requests coming to the website, and if you have the ability to obtain more requests at once and sending a huge amount of requests won’t crash the website.  

Telegram:    Hackread:   Cyberdaily:    BNN Breaking:    Chasles Corp:    BNN Breaking:    LINX

You Might Also Read: 

Surging Attacks On Israeli Websites:

__________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransom Attackers Impersonate Security Researchers
The Power Of Unified Cloud Protection »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

InsightCyber

InsightCyber

InsightCyber is on a mission to keep the world’s critical infrastructure, supply chains, and manufacturing operations cyber-safe, helping to prevent attacks that can have catastrophic impacts.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.

Sola Security

Sola Security

Sola Security is a cyber security startup company currently in Stealth mode.

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.