Tuesday, November 12, 2024
HomeCyber AttackAuthorities Indicted Two Anonymous Sudan Hackers Over Cyberattacks

Authorities Indicted Two Anonymous Sudan Hackers Over Cyberattacks

Published on

Malware protection

A federal grand jury has indicted two Sudanese nationals, Ahmed Salah Yousif Omer, 22, and Alaa Salah Yusuuf Omer, 27.

The pair are accused of operating Anonymous Sudan, a notorious cybercriminal group responsible for tens of thousands of Distributed Denial of Service (DDoS) attacks targeting critical infrastructure and government agencies globally.

Unveiling the Cybercriminal Network

The indictment, unsealed today, reveals that Anonymous Sudan has used a sophisticated tool known as the Distributed Cloud Attack Tool (DCAT) to launch over 35,000 DDoS attacks since early 2023.

- Advertisement - SIEM as a Service

These attacks have targeted sensitive entities such as the Departments of Justice and Defense and major corporations like Microsoft Corp. and Riot Games Inc.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

The group’s actions have caused significant disruptions, including a notable incident where Cedars-Sinai Medical Center’s emergency department was forced to redirect patients for eight hours due to an attack. 

United States Attorney Martin Estrada condemned the group’s actions as “callous and brazen,” emphasizing their impact on critical services like hospitals.

The FBI’s seizure of Anonymous Sudan’s DDoS tool in March 2024 marked a pivotal moment in dismantling the group’s capabilities.

Legal and Investigative Efforts

Ahmed Salah is charged with one count of conspiracy to damage protected computers and three counts of damaging protected computers.

If convicted, he faces a potential life sentence in federal prison. Alaa Salah faces up to five years if found guilty.

These charges underscore the seriousness with which U.S. authorities are addressing cyber threats. 

Special Agent in Charge Rebecca Day from the FBI Anchorage Field Office highlighted the success of disabling the attack platform through court-authorized seizure warrants.

This action was part of Operation PowerOFF, an international effort to dismantle criminal DDoS-for-hire infrastructures.

Collaborative International Response

The investigation involved multiple agencies, including the FBI’s Anchorage Field Office, the Defense Criminal Investigative Service, and the State Department’s Diplomatic Security Service.

The collaborative effort extended to private sector partners such as Akamai SIRT, Amazon Web Services, Cloudflare, and Google. 

Kenneth A. DeChellis of DCIS emphasized the importance of these partnerships in safeguarding networks against evolving cyber threats.

The operation demonstrates a robust international resolve to hold cybercriminals accountable and protect global cybersecurity.

As this case progresses through the legal system, it is a stark reminder of the ongoing battle against cybercrime and the critical need for vigilance and cooperation among nations and private entities.

The indictment is a significant step towards justice for victims worldwide, but it also highlights the persistent threat posed by sophisticated cybercriminal networks.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...