Pro-Russian Hacktivists Escalate Attacks on Portals, Banks, and E-Commerce Platforms
Data from Radware reveals that between October 6 and 8, 2025, more than 50 DDoS attack claims were posted online over 14 times the daily average recorded during September.
The escalation marks a consistent pattern observed during this symbolic period since 2023, as hacktivists harness political anniversaries to amplify operations.
Hacktivist channels on Telegram and X (formerly Twitter) turned into coordination hubs for real-time attack chatter and propaganda sharing.
The campaign began when Sylhet Gang, acting as a mobilization nucleus rather than a technical operator, circulated public calls for cyber action targeting Israeli infrastructure.
Although its own DDoS claims and alleged system breaches lacked verification, Sylhet Gang’s messaging spurred multiple collectives to join the operation.
Its Telegram posts claimed compromises of servers across Israeli and European networks, with references to website defacements and data exfiltration attempts.
Arabian Ghosts quickly emerged as the most prolific participant, responsible for over 40% of total DDoS declarations.
Operating via its “MADGHOST” channel, the group combined propagandist amplification with direct action, publishing check-host verification links supporting its disruption claims.
Many of its attack messages included hashtags such as #OpIsrael and references to “Al-Aqsa Flood,” symbolically aligning its activities with the Palestinian resistance narrative.
The involvement of NoName057(16), a notorious pro-Russian hacktivist group, marked an expansion of scope and coordination across ideological divides.
Already known for anti-Western DDoS campaigns, NoName057(16) deployed its DDOSIA volunteer botnet network against Israeli government sites and even extended activity to German systems identified as pro-Israel.
Attack confirmations were accompanied by latency logs and HTTP response screenshots, signaling attempts to legitimize their operations publicly.
This cross-targeting reveals an emerging hybrid narrative where Russian-aligned collectives coalesce around common political opponents, strengthening the global hacktivist fabric.
Other participants, such as Keymous+, executed rapid coordinated DDoS strikes against financial and insurance entities. Posts containing traceroute logs and proof-of-disruption screenshots indicated utilization of lightweight botnets and spoofed IP floods.
According to Radware’s telemetry, most incidents lasted less than 20 minutes, pointing to transient bursts rather than persistent penetration attempts.
Target selection skewed toward high-visibility and symbolic assets, government portals, transactional platforms, and e-commerce domains chosen for maximum psychological and media exposure rather than strategic damage.
Between October 6 and 8, claimed DDoS volumes rose nearly 200% week-over-week, reaffirming how politically charged anniversaries serve as rallying points for cyber collectives.
Ideologically diverse groups continue merging resources and narratives, transforming symbolic aggression into synchronized digital offensives.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Pro-Russian Hacktivists Escalate Attacks on Portals, Banks, and E-Commerce Platforms appeared first on Cyber Security News.
This has been a week to remember here at The Verge. MWC 2026 in Barcelona…
Walmart bought Vizio in 2024, and now it's taking the next steps to formally fold…
TriZetto Provider Solutions, a healthcare technology subsidiary of the IT services giant Cognizant, has officially…
The woman at the door wore a plush lobster headdress. She sat in the front…
There are a lot of games that try to emulate The Legend of Zelda, but…
200 Years Ago Notice! Persons desirous of taking stock in the Hampshire and Hampden Canal…
This website uses cookies.