Palestinian Hacking Group, the Dark Storm on Monday claimed the responsibility for the X (East Twitter) hacking.
The attack led to a major global outage, affecting more than 40,000 users. Stayed down for several hours before the stage was restored. X CEO Elon Musk said that the forum faced a large -scale cyber attack. “This was done with a lot of resources,” Musk wrote, suggesting that “either a large, coordinated group and/or a country.”
Who are dark stories?
The Dark Storm Team is a Pro-Filistini hecticist group known for starting cyber attacks against institutions they see as Israel supporters. Their operations include the refusal-service (DDOS) attack and other forms of cyber war, targeting governments, infrastructure and lined outfits with the interests of Israel.
Dark Storm is not only inspired by ideology, it also sells cyber attacks for benefits. The group provides DDOS attacks on both safe and weak websites, with database violations, according to its telegram channel.
Dark Storm activities
- Threats against NATO and colleagues: In February 2024, the Dark Storm team issued an ultimatum threatening cyber attacks on nations supporting NATO countries, Israel and Israel. These threats outlined the intention of the group to disrupt vital services and government websites.
- Cooperation with pro -Russian institutions: The group allegedly collaborated with pro -Russians hawist organizations, expanding their operational access. Their activities include selling hacking tools and services through various channels.
- Targeting US Infrastructure: The Dark Storm team has claimed responsibility for cyber attack on US Infrastructure, including a DDOS attack at John F. Kennedy International Airport in October 2024, which is inspired by the alleged support of the airport for Israel as inspiration.
How did Dark Storm attack X?
Cyber safety experts identified the X attack as a multi-level distributed District Insar-Service (DDOS) attack. Hackers flooded the X server with huge amounts of fake requests, crippling the stage’s ability to function.
Unlike a simple traffic growth, the attack used a boatnet – a network of kidnapped equipment – including compromised individual computer, smart cameras, and routers. These devices controlled by hackers helped maintain the attack and made it difficult to stop.
The X has not yet confirmed whether there was a dark store behind the attack.