spot_img

Date:

Share:

NETSCOUT Warns of New Hacktivist Threat Posing Global Risks, from the US, Middle East, Africa and Beyond

JOHANNESBURG, South Africa – 17 June 2025 – DieNet, a newly emerged hacktivist group, has claimed responsibility for more than 60 distributed denial-of-service (DDoS) attacks in just two months, including its most recent and widely reported action: the global disruption of X (formerly Twitter).

According to NETSCOUT, a leading provider of enterprise performance management, carrier service assurance, cybersecurity and DDoS protection solutions, the DieNet group announced itself on March 7, 2025, via a now-banned Telegram channel, and its targets span transportation, energy, medical systems and digital commerce.

DieNet has leveraged DDoS-as-a-service infrastructure, commonly shared with other groups such as OverFlame and DenBots Proof, to launch ideologically driven attacks against the US, Iraq, Israel, Sweden, and Egypt to date. And, although the group claims some success, it is often difficult to validate whether the attacks have had any impact on the targets.

“However, their scale and frequency – often allegedly averaging one attack per day – expose the ease with which new actors can exploit widely accessible rented infrastructure to launch their own DDoS campaigns,” says Bryan Hamman, regional director: Africa at NETSCOUT, “and this is something that should raise concern across Africa.

“Local organisations are increasingly being targeted by DDoS and other cyberattacks, particularly in sectors like telecoms, government and financial services. The rapid mobilisation and global scale of groups like DieNet highlight just how easily bad actors can take advantage of available tools to disrupt services on any continent, including ours.”

Since its emergence earlier this year, DieNet has gained visibility through other known active threat actor organisations, such as Mr. Hamza, Sylhet Gang-SG and LazaGrad Hack. Its attack methods are characterised by a mixture of vectors such as TCP RST, DNS amplification, TCP Syn and NTP amplification. The chosen vectors and attack patterns vary between targets.

Despite DieNet’s claims, NETSCOUT’s analysis reveals no evidence of a proprietary botnet. Instead, the group appears to rely on the same attack infrastructure used by other threat actors, reinforcing the risk posed by DDoS-as-a-service ecosystems.

The tactics used by DieNet demonstrate how easily malicious actors can launch attacks using widely accessible platforms, without needing large-scale technical infrastructure, comments Hamman.

“What’s clear is that organisations in Africa can no longer afford a reactive approach,” he adds. “Early detection, real-time visibility and proactive mitigation are critical to staying one step ahead of cyber criminals.”

NETSCOUT is a leading provider of enterprise performance management, carrier service assurance, cybersecurity and DDoS protection solutions. For more information, please visit https://www.netscout.com/

spot_img
spot_img

━ More like this

You Have Been Storm’ed

Everyone at some point clicks something they should not have. An email link without thinking. Or, in a rush, you click a web or...

Kaspersky MDR introduces major updates, strengthening detection and investigation capabilities

Kaspersky Managed Detection and Response now offers enhanced automation and incident management features, introduces a new offering for industrial and embedded systems, and delivers...

AI Has Turned Biometric Security Into a Fraud Target, New Data Shows

New data shows nearly 9 in 10 failed identity checks in Southern Africa are linked to AI-driven impersonation.  The systems designed to verify identity and...

Online scam exposure remains widespread despite high levels of self-assurance, Kaspersky reports

A recent Kaspersky survey highlights a considerable gap between consumers’ confidence in identifying online scams and their actual exposure to cyber threats. According to...

Identity under siege: The new order of security in 2026

The threat model has changed as artificial intelligence lowers the barrier to entry for cybercrime. Attack velocity and threat veracity have increased exponentially. Impersonation...
spot_img