New DDoS-as-a-Service Platform Attacking Medical Institutions

Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers. 

During the attacks on January 27, the Passion Botnet was used to target medical institutions in the United States, Portugal, Spain, Germany, Poland, Finland, Norway, the Netherlands, and the United Kingdom as retaliation for sending tanks to support Ukraine.

These botnets are typically created by infiltrating vulnerable IoT devices, including routers and IP cameras, and grouping them into a large swarm that sends malicious requests to a specific target.

The Passion platform was identified by Radware, and despite the fact that its origins are unknown; the operation has clear ties to Russian hacking groups.

Through its Telegram channels, some of which date back to March 2022, Passion has a significant online presence. Passion has received support from other hacktivist organizations like Anonymous Russia, MIRAI, Venom, and Killnet.

Passion DDoS Platform

Reports stated that at the beginning of January 2023, the operators of the Passion DDoS platform began to advertise their service by defacing the websites of many South African and Japanese organizations.

“Hacktivists and defacement attacks can pose a serious risk to targeted organizations. They can significantly harm an organization’s reputation, causing a loss of trust and credibility with customers and stakeholders”, Radware researchers.

Customers that subscribe to the service can choose the preferred attack vectors, duration, and intensity. Passion gives users the choice of ten attack vectors, enabling subscribers to customize their attack as necessary and even combine vectors to go beyond the target’s mitigations.

“DDoS services are generally sold as a subscription-based model, allowing customers to choose their attack vectors, duration, and intensity”, researchers

Promotional Passion Defacement

The supported attack methods include:

  • HTTP Raw
  • Crypto
  • UAM Browser
  • HTTPS Mix
  • Browser
  • Bypass
  • DNS l4
  • Mixamp l4
  • OVH-TCP l4
  • TCP-Kill l4

Threat actors must pay $30 for a seven-day subscription, $120 for a month, and $1,440 for a full year to use the service. The following payment options are accepted: Tether, QIWI, and Bitcoin.

Dstat[.]cc is a web service that provides botnet owners to assess the capacity and capabilities of their DDoS attack services. Bot herders use DStat sites to gauge and demonstrate the strength of their botnet, booter, or script against various unprotected and protected targets

Demoing Passion’s power on Dstat[.]cc

Bot herders can conduct both Layer 4 and Layer 7 attacks against targets in different countries and measure their performance against mitigation providers like CloudFlare, Google Shield, and protection services from Amazon, Digital Ocean, Microsoft, OVH, and Vultr.

According to the reports, healthcare is not the only sector under threat. In October of last year, websites of airports in the US were targeted by Killnet and its affiliates, and throughout 2022, other government websites in the west were also targeted. Attacks on Japanese public services and government websites were blamed on Killnet in September 2022. 

Any essential public service or infrastructures in the US and Europe, as well as any nation, who publicly backs Ukraine and speaks out against Russia, are all potential targets.

Network Security Checklist – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague…

2 days ago

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave…

2 days ago

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories…

2 days ago

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with a…

2 days ago

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages…

2 days ago

KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a…

2 days ago