New DDoS-as-a-Service Platform Attacking Medical Institutions

Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers. 

During the attacks on January 27, the Passion Botnet was used to target medical institutions in the United States, Portugal, Spain, Germany, Poland, Finland, Norway, the Netherlands, and the United Kingdom as retaliation for sending tanks to support Ukraine.

These botnets are typically created by infiltrating vulnerable IoT devices, including routers and IP cameras, and grouping them into a large swarm that sends malicious requests to a specific target.

The Passion platform was identified by Radware, and despite the fact that its origins are unknown; the operation has clear ties to Russian hacking groups.

Through its Telegram channels, some of which date back to March 2022, Passion has a significant online presence. Passion has received support from other hacktivist organizations like Anonymous Russia, MIRAI, Venom, and Killnet.

Passion DDoS Platform

Reports stated that at the beginning of January 2023, the operators of the Passion DDoS platform began to advertise their service by defacing the websites of many South African and Japanese organizations.

“Hacktivists and defacement attacks can pose a serious risk to targeted organizations. They can significantly harm an organization’s reputation, causing a loss of trust and credibility with customers and stakeholders”, Radware researchers.

Customers that subscribe to the service can choose the preferred attack vectors, duration, and intensity. Passion gives users the choice of ten attack vectors, enabling subscribers to customize their attack as necessary and even combine vectors to go beyond the target’s mitigations.

“DDoS services are generally sold as a subscription-based model, allowing customers to choose their attack vectors, duration, and intensity”, researchers

Promotional Passion Defacement

The supported attack methods include:

  • HTTP Raw
  • Crypto
  • UAM Browser
  • HTTPS Mix
  • Browser
  • Bypass
  • DNS l4
  • Mixamp l4
  • OVH-TCP l4
  • TCP-Kill l4

Threat actors must pay $30 for a seven-day subscription, $120 for a month, and $1,440 for a full year to use the service. The following payment options are accepted: Tether, QIWI, and Bitcoin.

Dstat[.]cc is a web service that provides botnet owners to assess the capacity and capabilities of their DDoS attack services. Bot herders use DStat sites to gauge and demonstrate the strength of their botnet, booter, or script against various unprotected and protected targets

Demoing Passion’s power on Dstat[.]cc

Bot herders can conduct both Layer 4 and Layer 7 attacks against targets in different countries and measure their performance against mitigation providers like CloudFlare, Google Shield, and protection services from Amazon, Digital Ocean, Microsoft, OVH, and Vultr.

According to the reports, healthcare is not the only sector under threat. In October of last year, websites of airports in the US were targeted by Killnet and its affiliates, and throughout 2022, other government websites in the west were also targeted. Attacks on Japanese public services and government websites were blamed on Killnet in September 2022. 

Any essential public service or infrastructures in the US and Europe, as well as any nation, who publicly backs Ukraine and speaks out against Russia, are all potential targets.

Network Security Checklist – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…

1 day ago

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…

2 days ago

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…

2 days ago

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…

2 days ago

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…

2 days ago

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…

2 days ago