As the revolution inside Sudan continues, more and more hackers and hacking groups have joined the festivities as the cyber attacks continue to plague the Government of Sudan.
Search results for ‘Sudan’
After Sudan’s military forces executed a teacher, whistle-blower comes forward leaking documents tying Sudan’s Government to Italian cyber contractors illegally hacking/monitoring dissidents and journalists dating back to 2012.
Ending within the last 1-2 hours, S1ster of the Brasilian based hacking group Pryzraky claimed responsibility for a prolonged DDoS attack targeting Sudan’s Ministry of Defense, crashing the site for 24 hours using the Poseidon Botnet.
Hack of Tirhal servers exposes widespread public, corporate and governmental corruption in the name of domestic espionage.
In conjunction with #OpSudan, this past weekend a hacker going by the name of Mr. Sniper announced a hack and leak effecting Tihral, Sudan’s version of Uber, leaking sensitive information tied to drivers and clients of the service online.
Friday night a group of hackers known as the Sudan Cyber Army announced a hack of Sudan’s Ministry of National Defense, managing to download 43.3 MB of data from the website before leaking it online.
Hackers across the world have come together to do what they could in support of the people of Sudan, teaching its citizens how to bypass internet restrictions while taking down close to 300 Sudanese Government websites.
Government of Sudan Restricts National Internet Access, Blocks Social Media Amidst Ongoing National Protests
In the wake of deadly protests throughout the country over recent days, the Sudanese Government has blocked national internet access and restricted access to social media accounts to prevents protesters and activists from coordinating further demonstrations.
In response to the shutdown of national internet access across the country and in response to the deaths of protesters at the hands of Zimbabwe’s Government, Anonymous has launched #OpZimbabwe in solidarity with the people of Zimbabwe.