Alabama State Cyberattack Confirmed By Officials


After the Anonymous Sudan hacker group claimed responsibility for a distributed denial-of-service (DDoS) attack, the Alabama state government acknowledged the breach. Jeremy Ward, a spokesperson for Alabama’s Office of Information Technology, confirmed the Alabama state cyberattack and led efforts to minimize its effects.

However, officials have neither confirmed the name of the hacking group responsible for the Alabama state cyberattack nor denied the involvement of Anonymous Sudan, leaving the situation in a state of uncertainty.

Utilizing the InfraShutdown tool, the Anonymous Sudan cyberattack highlights the increasing prowess of the hacktivist group, showcasing their adeptness in deploying DDoS attacks against governmental entities worldwide.

Decoding the Alabama State Cyberattack

Over several days, the cyberattack targeted Alabama’s state infrastructure, causing intermittent disruptions on numerous government agency websites. The DDoS attack targeted three key government agencies in Alabama, including the State of Alabama, the Office of Information Technology, and the Alabama Supercomputer Authority.

Source: X

Although the attack did not result in data theft or network breaches, it caused disruptions to online services provided by these agencies.

Alabama State Cyberattack
Source: X

Anonymous Sudan, the group behind the cyberattack, claimed responsibility for the incident, citing reasons such as drawing attention to the situation in Sudan and protesting perceived support for Israel by the United States.

The group, known for its participation in DDoS attacks against various targets worldwide, has been a cause of concern for governments and organizations globally.

In addition to the cyberattack on government websites, the city of Birmingham also faced computer network issues, further highlighting the vulnerability of critical infrastructure to cyber threats. 

Who is the Anonymous Sudan Hacker Group?

Anonymous Sudan, a self-proclaimed hacktivist group from Sudan, has been associated with cyber incidents worldwide, mainly conducting DDoS attacks. Despite claiming grassroots origins, they’ve been linked to pro-Russian, anti-Western agendas. 

Emerging in a Russian-speaking Telegram channel, they targeted entities opposing their views on Islam or Sudan-related issues, favoring pro-Kremlin goals. Their targets range from airlines to hospitals, with concentrations in the USA, NATO countries, and former Soviet bloc nations. 

Anonymous Sudan strategically times attacks for maximum impact, often boasting on social media. Their attack patterns predominantly involve multi-vector assaults, utilizing both TCP-based and UDP reflection/amplification vectors. Despite efforts to track them, their use of DDoS-for-Hire services and obfuscated infrastructure make attribution challenging. 

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.



Source link