
In a newly published report by NETSCOUT, a new hacktivist group known as DieNet has surfaced, claiming responsibility for a series of distributed denial-of-service (DDoS) attacks. Within a mere two months, DieNet has asserted its involvement in over 60 DDoS attacks, targeting critical infrastructure spanning from U.S. transit systems to Iraqi government websites.
Announced via a now-banned Telegram channel on March 7, 2025, DieNet swiftly garnered attention and support from other known threat groups including Mr.Hamza, Sylhet Gang-SG, and LazaGrad Hack. Since its debut, DieNet has taken credit for at least one DDoS attack every day, demonstrating an aggressive pace of activity.
According to NETSCOUT: “DieNet leverages DDoS-as-a-service infrastructure, shared with groups such as OverFlame and DenBots Proof, to launch ideologically driven attacks.”
This allows the group to scale rapidly without the need to maintain a proprietary botnet. Although DieNet boasts of having its own “very large botnet,” NETSCOUT observes: “Analysis of the attack sources reveal no discernible pattern or cluster of devices that would indicate an owned/controlled botnet.”
DieNet’s attacks have targeted a range of vital industries and services:
- U.S. Infrastructure: Los Angeles Metropolitan Transportation Authority, Port of Los Angeles, Chicago Transit Authority, North American Electric Reliability Corporation
- Iraq: Ministry of Foreign Affairs
- Digital Commerce & Communication: NASDAQ, the Internet Archive, X (formerly Twitter), and large SaaS providers
- Healthcare: Epic Systems, MediTech
The goal appears to be to cause highly visible disruptions. As the report notes: “These targets span a wide range of industries, but all seem to be aimed at maximizing visible disruptions by targeting key infrastructure.”
DieNet employs a variety of attack vectors in its DDoS campaigns, including:
- TCP RST
- DNS Amplification
- TCP SYN Floods
- NTP Amplification
These vectors are rotated or combined depending on the target, adding unpredictability and increasing the difficulty of effective mitigation.
The report emphasizes: “Organizations such as DieNet can spin up and begin launching a flurry of attacks overnight, all without having to rely on capturing their own infrastructure.”
Related Posts:
- Pro-Russian Threat Actors Launch Coordinated DDoS Attacks Against Japanese Organizations
- NETSCOUT ASERT Uncovers Disturbing Surge in Global Malicious Botnet Activity
- Multiple Vulnerabilities in NETSCOUT nGeniusONE Threaten Infrastructure Visibility Platforms
- HTTP/2 Rapid Reset Attack: HTTP/2 Zero-Day Vulnerability Rocks Cybersecurity World
- Apple launches iOS 16.4 (a) with Rapid Security Response update