infotechlead

Who’s Dark Storm, the group behind DDoS attack on X (formerly Twitter)?

Dark Storm Team has claimed responsibility for a major distributed denial-of-service (DDoS) attack on X (formerly Twitter), marking another escalation in politically motivated cyber threats. This cyber security incident highlights the vulnerability of even the most established digital platforms to sophisticated attacks driven by ideological and financial motives.

X is new logo of Twitter
X is new logo of Twitter

Check Point Research (CPR) has been tracking the Dark Storm Team, a pro-Palestinian cyber-attack group specializing in DDoS attacks. While their actions align with political motivations, they have also positioned themselves as a profit-driven cyber attack service provider, offering DDoS-for-hire services and breach databases for sale.

Their recent resurgence, particularly after the takedown of their Telegram channel, has led to a spike in cyber attacks against Western organizations and critical infrastructure in the U.S., Israel, Ukraine, and the UAE. These strategic targets indicate a deliberate effort to disrupt essential services, weaken national security structures, and send a geopolitical message.

Dark Storm operates using sophisticated obfuscation techniques, making attribution challenging. They rely on rented IP addresses from multiple regions, large botnets composed of thousands of compromised devices, and proxies and VPN services to mask their real locations.

One of their distinctive tactics includes using “proof links” via third-party services like check-host.net, allowing them to publicly verify their attacks by documenting the availability of targeted websites at specific times. This approach enhances their credibility among supporters and potential clients looking for their services.

Attributing responsibility in cyber attacks of this nature remains complex, as multiple actors, including potential state-sponsored groups, may collaborate to achieve their objectives. The large-scale botnets used in DDoS attacks consist of infected devices from around the world, making it difficult to pinpoint a precise geographical origin.

While Dark Storm has publicly claimed responsibility for the attack on X/Twitter, only the platform itself has full visibility into the nature of the incident and its origins. Cybersecurity experts have assessed the situation using open-source intelligence and the group’s own statements on Telegram.

The resurgence of Dark Storm raises critical concerns about the resilience of global digital infrastructure. Their relentless focus on government, aviation, defense, and logistics sectors demands an urgent reassessment of cybersecurity strategies. The attack on X underscores the importance of robust cyber defense mechanisms for social media platforms, which play a crucial role in worldwide communication. Notably, in February, organizations in the U.S. faced an average of 1,323 cyber-attacks per week, with the media and entertainment sector ranking as the fourth most targeted industry.

With social media platforms, government agencies, and enterprises increasingly becoming prime targets, security teams must adopt a prevention-first approach. This includes integrating advanced threat detection systems, real-time response mechanisms, and comprehensive DDoS mitigation solutions to safeguard against the evolving cyber threat landscape.

Baburajan Kizhakedath

Latest

More like this
Related

Gartner’s views on Google Cloud’s $32 bn deal to buy Wiz

Google has announced its acquisition of Wiz, a leading...

Google Cloud’s $32 bn Wiz deal explained

Alphabet has announced its largest acquisition to date with...

Infosys settles U.S. cyber incident lawsuits for $17.5 mn

Indian IT services giant Infosys has reached a settlement...

India’s Ministry of Housing reveals AWS bucket with 2 mn sensitive data

Cybernews research team has discovered an exposed AWS bucket...