InfraShutdown: Anonymous Sudan Partners With DDoS-for-Hire Operator


February 28, 2024 06:45 PM

Anonymous Sudan joined the global threat scene in January 2023 when they attacked Denmark and Sweden, claiming to be pro-Muslim hacktivists operating from Sudan.

Download

Background

Anonymous Sudan joined the global threat scene in January 2023 when they attacked Denmark and Sweden, claiming to be pro-Muslim hacktivists operating from Sudan. Some believe Anonymous Sudan to be a black flag operation run by the Russian government, while others believe they were originally pro-Islamic hacktivists operating from Sudan. In last year’s Global Threat Analysis Report, we referred to Anonymous Sudan as the rebel with too many causes, claiming distributed denial of service (DDoS) attacks driven by religion (pro-Islamic), by politics (pro-Sudanese and pro-Russian) and financial gain (extortion DDoS and stresser advertisements). This random behavior became most prominent in the second half of 2023, during which the overall activity of Anonymous Sudan slowed considerably. Now, in 2024, Anonymous Sudan is back on the forefront with an announcement that cannot be ignored.

Anonymous Sudan still regularly made headlines in the second half of 2023 by targeting and disrupting high-profile online services. Microsoft, X, OpenAI and others became a target of Anonymous Sudan and suffered interruptions to some extent. When Anonymous Sudan first appeared on the stage, it was an unknown entity until it attacked a common enemy of the enigmatic Russian hacktivist group Killnet and was inaugurated in the Killnet cluster by former Killnet leader KillMilk. Leveraging the Killnet brand to lift itself out of anonymity (pun intended), Anonymous Sudan quickly became a force to reckon with.

Figure 1: Pre-announcement and announcement of the InfraShutdown service (source: Telegram) Figure 1: Pre-announcement and announcement of the InfraShutdown service (source: Telegram)

Figure 2: InfraShutdown service announcement (source: Telegram) Figure 2: InfraShutdown service announcement
(source: Telegram)

In the first few months of 2023, Anonymous Sudan’s primary tactic was Web DDoS attacks from public cloud servers, hiding attack sources behind and across thousands of HTTPS/SOCKS proxies. After the attacks on Denmark, Anonymous Sudan’s IBM/SoftLayer Cloud servers were flagged for abuse and taken down. Anonymous Sudan continued its attacks after its servers were taken offline, most probably migrating their operations to a bulletproof cloud provider. Attacks from Anonymous Sudan were characterized by Web DDoS attacks combined with alternating waves of UDP and SYN floods. Attacks originating from tens of thousands of unique source IP addresses and UDP traffic reaching up to 600 gigabits per second (Gbps) while HTTPS request floods reached in the several million requests per second (RPS).

In the second half of 2023, Anonymous Sudan leveraged the SKYNET/GODZILLA botnet to perform attacks against Microsoft, X and OpenAI (ChatGPT). In the posted claims on Telegram for the attacks, Anonymous Sudan added the footnote that these attacks were performed with the SKYNET botnet. The SKYNET/GODZILLA botnet rents its infrastructure for DDoS attacks and provides a combination of Web DDoS, volumetric attacks (UDP Frag and UDP Amplification), TCP SYN and SYN-ACK. Through the dstat Linux command , SKYNET/GODZILLA demonstrated 40Gbps for L4 TCP attacks and over 200Gbps for UDP attacks, while Web DDoS (HTTPS) attacks leveraging proxies had a potential of 15 million RPS.

On February 24, 2024, Crush, the leader of Anonymous Sudan, announced a new DDoS service named “InfraShutdown,” labeling it as “the pinnacle of bullet-proof cyber dominance,” offering DDoS attack campaigns tailored to the needs of its global clientele with military-grade privacy. This supposedly new DDoS-for-hire service was described as “specialized in nation-state level disruptions, targeting critical infrastructures, financial system, and telecommunication networks” in an announcement forwarded by the @InfraShutdown Telegram channel that was created on February 24, 2024, coinciding with the date of the announcement.

An Exclusive Service

New subscribers are asked to provide visual proof of their crypto balance. No proof, no admittance. Typical booter and stresser services are very lenient in their terms for users to subscribe and openly advertise their (cheap) prices on Telegram. It looks like InfraShutdown is attempting to create an exclusive offering, targeting a market with very specific needs and a requirement for more serious attack power.

Figure 3: Requirement to provide visual proof of funds in a crypto wallet to join the service (source: Telegram) Figure 3: Requirement to provide visual proof of funds in a crypto wallet to join the service (source: Telegram)

Promotion

Through its Telegram channel @xAnonymousSudan, which reaches over 55,000 subscribers as of February 28, 2024, Anonymous Sudan promotes the new service through advertisements and by claiming denial of service attacks against highly visible and public targets. Note that the original @AnonymousSudan channel reached over 120,000 subscribers before it got banned, forcing the group to start anew with an alternative channel named @xAnonymousSudan.

Figure 4: Advertising the services of InfraShutdown on its Telegram channel (source: Telegram) Figure 4: Advertising the services of InfraShutdown on its Telegram channel (source: Telegram)

LEARN MORE AT RADWARE’S SECURITY RESEARCH CENTER

To know more about today’s attack vector landscape, understand the business impact of cyberattacks, or learn more about emerging attack types and tools, visit Radware’s Security Research Center. Additionally, visit Radware’s Quarterly DDoS & Application Threat Analysis Center for quarter-over-quarter analysis of DDoS and application attack activity based on data from Radware’s cloud security services and threat intelligence.

Click here to download a copy of the ERT Threat Alert.

Download Now

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia