• Latest
  • All
  • How To
Hacker Typing On a Laptop

Anonymous Sudan: Dissecting The Recent Cyber Attacks On Kenya Infrastructure

July 29, 2023
ios 26 apple

iOS 26: New Features To Expect Ahead of June 9 Launch

June 5, 2025
CA ranked by ITU as best in Africa ICT regulations

Kenya’s ICT Regulation Surpasses US, Crowned Africa’s Best by UN

June 5, 2025
Kenya startup funding growth

New Report: Startup Growth at Risk Due to Foreign Funding Dependence

June 5, 2025
Apple Airpods

AirPods Could Soon Answer Calls and Snap Photos Hands Free

June 5, 2025
DHgate Tablet Cases deals
instagram-edits

Instagram Adds Teleprompter to Edits App in Bid to Rival CapCut

June 5, 2025
Sora

Microsoft Brings Sora AI Video Creator to Bing App

June 5, 2025
google-ai-edge-gallery

New Google App Lets You Use AI Offline on Android

June 5, 2025
adobe-photoshop-iphone

Adobe Launches Photoshop Beta App for Android

June 5, 2025
Material 3 Expressive

Gmail and Messages Get a Colorful Makeover

June 5, 2025
Rose Njeri, the creator of Civic Email

Rose Njeri Charged With Cybercrime for Letting Kenyans Email Their MPs

June 3, 2025
Infinix Hot 60 Pro+ Leaked Design

Infinix Hot 60 Pro+ Could Be the World’s Thinnest Curved Display Phone

June 3, 2025
Infinix Note 50 Pro Review

Infinix Note 50 Pro Review: A Budget Phone Shouldn’t Be This Good

Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Anonymous Sudan: Dissecting The Recent Cyber Attacks On Kenya Infrastructure

ElvyLewis Ndungu by ElvyLewis Ndungu
July 29, 2023
in Features
Reading Time: 7 mins read
270
0
Hacker Typing On a Laptop

Recent cyberattacks waged on Kenya’s online infrastructure have left various Government and privately owned services crippled as many citizens question the country’s level of preparedness against prevailing cyber threats. The group claiming responsibility is Anonymous Sudan.

Who Are Anonymous Sudan?

The hacktivist group based in Sudan has been hitting headlines in a wave of attacks against various Governments around the world. The group usually targets critical sectors in the country including education, government, finance, healthcare and aviation.

The attacks appear motivated by religion and politics with the first message posted on their telegram channel being, “We will attack any country with Cyber attacks against those who oppose Sudan”. Sticking to their words, their recent victim in their campaign is Kenya.

The pro-Russian hacktivist’s weapon of choice is Distributed Denial of Service (DDoS) attacks on a state’s infrastructure. This form of cyber attack aims at disrupting a service or network rendering it inaccessible to its normal users. To achieve this, an attacker floods the service or network with internet traffic.

In what has been a “busy” year for the group, Anonymous Sudan has targeted mostly Western countries with their first attack being on Sweden and Denmark back in January. This was in retaliation to Rasmus Paludan (who is a duo citizen of the two countries) burning the Quran.

The group has continued to wage cyber warfare on other organizations in other countries including France, Germany, Israel, India, the U.K, and the U.S.A.

Recently, the group has started extorting its victims in order to stop the attacks. Notably, the group demanded $1 million from Microsoft to stop their DDoS attacks on Microsoft’s key services including Outlook, and Azure. This was a third of what the cyber criminals had demanded from Scandinavian Airlines back in May.

Russian Hackers?

Despite their name, security researchers believe that Anonymous Sudan is a Russian Hacking group. Researchers from Flashpoint point to the group’s affiliation with Killnet, a Russian hacktivist collective formed around March last year. In the report, Flashpoint Intel Team says, “Evidence also suggests that Anonymous Sudan are likely state-sponsored Russian actors masquerading as Sudanese actors with Islamist motivations, as cover for their actions against Western (or Western-aligned) entities.”

The researchers add, “Despite obfuscations on official Anonymous Sudan channels as to their identity and affiliations, the employment of social media or public facing accounts under the “hacktivist” banner is consistent with previous tactics, techniques, and procedures employed by Russian state-sponsored adversaries.”

The group took over the pseudonym of the “Original Anonymous Sudan” which emerged in 2019 in response to the country’s ongoing economic and political challenges. According to security researchers at SocRadar, the original Anonymous Sudan group was engaged in pro-Ukraine and anti-Russia operations. “Unlike the newer Anonymous Sudan, it is also known that they were involved in anti-Russia and pro-Ukraine ops with Ghostsec as a member of OpSudan hacktivism,” the team points out.

According to CyberNews, the group only started using Arabic in their posts after researchers pointed out that the group identifying with an Islamic country posted mostly in Russian. To cover their tracks, the group deleted older posts and started using “school-taught” Arabic, adopting the Sudanese dialect only later.

Apart from the DDoS campaign targeting U.S organizations in response to the US Secretary of State, Anthony Blinken’s comments regarding potential US involvement in Sudan affairs, the group had not been vocal on issues directly affecting Sudan and its people.

That is, until now.

The DDoS Attack on Kenyan Infrastructure

This week the saw Anonymous Sudan group launch a new campaign targeting Kenyan infrastructure through a series of DDoS attacks. This was in response to what the group termed as Kenya’s interference and meddling in Sudanese affairs.

READ MORE: Anonymous Sudan Continues DDoS Attacks On Kenyan Infrastructure

The attacks targeted critical infrastructure including various Government agencies, higher education institutions, private companies, and media companies among other public organizations.

Multiple services including KPLC token systems, M-Pesa to bank services, and government services offered on the e-citizen platform were affected by the recent attacks. Various organizations have already released statements addressing the unavailability of their services citing “system hitches”.

pic.twitter.com/jpQ8qMsjME

— Kenya Power (@KenyaPower_Care) July 27, 2023
KPLC on Twitter

Kenya Power and Lightning Company (KPLC) have already issued another statement confirming they have resolved the hitches.

The Kenyan e-citizen platform had been inaccessible for a while following the DDoS attacks. The ICT CS Eliud Owalo had confirmed that the e-citizen platform had been attacked. He further refuted claims by Anonymous Sudan that they compromised the system.

“It’s not strange because Cyber Attack is predominant the world over. We can not stop digitizing our records and digitalizing our services because we are risk averse. What we need to put in place is a risk mitigation framework which we are ready for anyway.” The CS said while speaking on Spice FM. The Government announced that E-Citizen services are back online.

Anonymous Sudan has further added that they have compromised key Government agencies including KRA and E-Citizen. According to a post in their telegram channel, the group intends to sell the data once done with the attacks.

The group has further “promised” more attacks today after Friday prayers.

Their demands:

The group posted two demands to the Kenyan government for the attacks to stop. In their telegram channel, the “hacktivists” say all attacks will cease if the government meets any of the two conditions:

Either an apology to Sudan issued by an Official from the Kenyan Government or $ 200,000 in bitcoin sent to their wallet.

Kenya’s Level Of Preparedness In the Face Of Cyberwarfare

There has been a rise in the frequency and sophistication of cyberattacks globally. The increasing development of emerging technologies including Artificial Intelligence, nanotechnology, blockchain and 5G, will further accelerate the complexity and severity of Cyber Warfare. The adaptation of these technologies in cyberspace will change the nature of wars.

Cyber warfare is unrestricted by borders and can cause more harm and as much damage as conventional warfare. What makes this form of warfare attractive to adversary nations is it’s relatively cheaper to deploy despite being highly impactful.

However, it is important to note that the recent DDoS attacks against our infrastructure is NOT cyberwarfare and does not even amount to cyber conflict. In an article, Gichuki Jonia, a former Cyber Command Operator at the Ministry of ICT says, “A full state-led operation would have all four effects conducted during a Computer Network Attack (CNA), i.e., disrupt, deny, degrade, and destroy. Thus, cyber is not just an enabler of war but also a strategic option in conflict. However, what we are observing is the maneuver of an adversary who lacks the capability to conduct CNA.”

Deterrence in the cyber domain relies more on resilience, deterring potential threat actors, and imposing costs rather than relying solely on political means. To harness the power of Nairobi’s offensive cyber capabilities, it’s imperative that corruption and political shenanigans come to a halt, allowing talent thread the needle and focus on capability development. This way, we can execute successful and impactful cyber operations against our adversaries via both DCO and OCO. As noted, acquiring the right talent is crucial since cyber initiatives should be a top priority within the national security agenda.

Gichuki Jonia (Chucks) on Countering The Current Distributed Denial of Service Cyber On-Slaughter Against GoK

ICT CS Eliud Owalo while on Spice FM added that the government was working towards building a “elaborate risk mitigation framework for sustainable digitalization”.

Recent cyber attacks on key agencies including the DDoS attacks by Anonymous Sudan and data breaches (KEBS and KAA data breaches) have revealed gaping holes in our cyber security systems and a lack of cyber awareness.

Read more: KEBS Suffers a Massive Data Breach

It is thus crucial for GoK to develop and implement cyber defensive strategies and practices to protect and strengthen our network and critical infrastructure.

Tags: Cyber Attacks
SendShare151Tweet95
ElvyLewis Ndungu

ElvyLewis Ndungu

Just a guy who loves to code and has a passion for storytelling | Bringing you the latest on all things tech. You can reach me via [email protected] or on Twitter.

Related Posts

NSSF Hacking Claims Disputed: Fund Says No Member Data Compromised

NSSF Denies Allegations of Massive 2.5TB Data Breach

May 21, 2025
Web DDOS Tsunami Attack

Web DDoS Tsunamis Are the Next Big Cyber Threat to Organizations

April 25, 2025
Paris Olympics on High Alert: Cyberattacks, Disinformation, and Sabotage Threaten Games

Paris Olympics Strategy as Cyberattacks, Disinformation, and Fiber Cuts Threaten Games

July 30, 2024
2024 Cyber Attack Report

2024 Cyber Attacks Report Reveals Africa Was the Hardest Hit Region

July 25, 2024
cybersecurity

AON Kenya Introduces a Comprehensive Cyber Enterprise Insurance Solution for Businesses

September 29, 2017
Security Flaw in 3G and 4G Networks Allows Hackers to Track Your Phone’s Location

Security Flaw in 3G and 4G Networks Allows Hackers to Track Your Phone’s Location

July 27, 2017

Latest

ios 26 apple

iOS 26: New Features To Expect Ahead of June 9 Launch

June 5, 2025
CA ranked by ITU as best in Africa ICT regulations

Kenya’s ICT Regulation Surpasses US, Crowned Africa’s Best by UN

June 5, 2025
Kenya startup funding growth

New Report: Startup Growth at Risk Due to Foreign Funding Dependence

June 5, 2025
Apple Airpods

AirPods Could Soon Answer Calls and Snap Photos Hands Free

June 5, 2025
instagram-edits

Instagram Adds Teleprompter to Edits App in Bid to Rival CapCut

June 5, 2025
Sora

Microsoft Brings Sora AI Video Creator to Bing App

June 5, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

iOS 26: New Features To Expect Ahead of June 9 Launch

June 5, 2025

Kenya’s ICT Regulation Surpasses US, Crowned Africa’s Best by UN

June 5, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

More News

New Google App Lets You Use AI Offline on Android

Adobe Launches Photoshop Beta App for Android

Gmail and Messages Get a Colorful Makeover

Rose Njeri Charged With Cybercrime for Letting Kenyans Email Their MPs

Infinix Hot 60 Pro+ Could Be the World’s Thinnest Curved Display Phone

Infinix Note 50 Pro Review: A Budget Phone Shouldn’t Be This Good

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.