Monday, May 5, 2025
HomeCyber Security NewsNew DDoS-as-a-Service Platform Attacking Medical Institutions

New DDoS-as-a-Service Platform Attacking Medical Institutions

Published on

SIEM as a Service

Follow Us on Google News

Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers. 

During the attacks on January 27, the Passion Botnet was used to target medical institutions in the United States, Portugal, Spain, Germany, Poland, Finland, Norway, the Netherlands, and the United Kingdom as retaliation for sending tanks to support Ukraine.

These botnets are typically created by infiltrating vulnerable IoT devices, including routers and IP cameras, and grouping them into a large swarm that sends malicious requests to a specific target.

- Advertisement - Google News

The Passion platform was identified by Radware, and despite the fact that its origins are unknown; the operation has clear ties to Russian hacking groups.

Through its Telegram channels, some of which date back to March 2022, Passion has a significant online presence. Passion has received support from other hacktivist organizations like Anonymous Russia, MIRAI, Venom, and Killnet.

Passion DDoS Platform

Reports stated that at the beginning of January 2023, the operators of the Passion DDoS platform began to advertise their service by defacing the websites of many South African and Japanese organizations.

“Hacktivists and defacement attacks can pose a serious risk to targeted organizations. They can significantly harm an organization’s reputation, causing a loss of trust and credibility with customers and stakeholders”, Radware researchers.

Customers that subscribe to the service can choose the preferred attack vectors, duration, and intensity. Passion gives users the choice of ten attack vectors, enabling subscribers to customize their attack as necessary and even combine vectors to go beyond the target’s mitigations.

“DDoS services are generally sold as a subscription-based model, allowing customers to choose their attack vectors, duration, and intensity”, researchers

Promotional Passion defacement
Promotional Passion Defacement

The supported attack methods include:

  • HTTP Raw
  • Crypto
  • UAM Browser
  • HTTPS Mix
  • Browser
  • Bypass
  • DNS l4
  • Mixamp l4
  • OVH-TCP l4
  • TCP-Kill l4

Threat actors must pay $30 for a seven-day subscription, $120 for a month, and $1,440 for a full year to use the service. The following payment options are accepted: Tether, QIWI, and Bitcoin.

Dstat[.]cc is a web service that provides botnet owners to assess the capacity and capabilities of their DDoS attack services. Bot herders use DStat sites to gauge and demonstrate the strength of their botnet, booter, or script against various unprotected and protected targets

Demoing Passion's power on Dstat.cc
Demoing Passion’s power on Dstat[.]cc

Bot herders can conduct both Layer 4 and Layer 7 attacks against targets in different countries and measure their performance against mitigation providers like CloudFlare, Google Shield, and protection services from Amazon, Digital Ocean, Microsoft, OVH, and Vultr.

According to the reports, healthcare is not the only sector under threat. In October of last year, websites of airports in the US were targeted by Killnet and its affiliates, and throughout 2022, other government websites in the west were also targeted. Attacks on Japanese public services and government websites were blamed on Killnet in September 2022. 

Any essential public service or infrastructures in the US and Europe, as well as any nation, who publicly backs Ukraine and speaks out against Russia, are all potential targets.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...