Cyber News

700+ DDoS Attacks Worldwide – Keymous+ Hacker Group Takes Responsibility

A shadowy new name has emerged at the forefront of global cyber headlines: Keymous+. Since late 2023, this group, self-styled as “North African hackers,” has claimed responsibility for over 700 distributed denial-of-service (DDoS) attacks that have spanned Europe, North Africa, the Middle East, and Asia.

The group’s erratic target list, puzzling alliances, and potential commercial ambitions are reshaping the landscape of hacktivism in 2025.

A Web of Random Attacks and Opportunistic Alliances

Keymous+ stands out for its chaotic targeting. According to cybersecurity firm Radware, their attacks have hit government portals, telecom networks in France and India, financial services in Morocco and the UAE, educational institutions in Denmark, and even manufacturing infrastructure in Israel.

Top countries impacted by Keymous+ in 2025 (source: Radware)

Despite slogans like “Hack for Humanity,” the choice of victims reveals no ideological focus, just frequency and visibility.

Notably, Keymous+ collaborates frequently with other hacktivist groups, including NoName057 (16), Mr. Hamza, and the Moroccan Dragons.

Joint operations, such as “Red Eye Op,” exemplify a networked approach to cyber disruption, leveraging alliances to achieve a broader impact and greater notoriety, rather than pursuing clear-cut agendas or targeting specific enemies.

This fluid, affiliate-driven model blurs traditional lines between hacktivism and marketing.

Technical Tactics – DDoS-for-Hire Meets Hacktivist Branding

Their primary weapon is the classic DDoS attack, which overwhelms websites with floods of malicious traffic to paralyze services.

Technical logs and posts from their Telegram and X (formerly Twitter) channels reveal reliance on automated tools for UDP floods, DNS amplification, HTTP/2 attacks, and spoofed SSH or ICMP requests.

Public Check-Host.net substantiates many attack claims and reports a tactic to validate their reach, if not their complete impact.

What sets Keymous+ apart is its semi-commercial twist. The group is closely linked to EliteStress, a DDoS-for-hire portal offering attack services for as little as €5 per day, scaling up to €600 per month for “premium” firepower.

Users are lured through Telegram bots and sleek dashboard interfaces, where they can launch attacks by simply selecting a target, choosing a vector, and setting a timer.

A now-deleted Keymous+ tweet even boasted about operating a stressor platform, strongly suggesting that their highly visible “Beta Team” may double as a marketing front for these for-profit DDoS operations.

Hacktivism or Hustle? The Blurring Lines

While Keymous+ claims to be a cause-driven collective, its growing focus on branding, service promotion, and alliances signals a shift in its approach.

The group represents a new breed of cyber threat – noisy, commercially motivated, and leveraging hacktivist rhetoric to build reputation and revenue.

As the border between ideological activism and cybercrime continues to erode, Keymous+ embodies the performative and profitable future of modern digital disruption.

Security analysts warn that if this model scales, both state and private targets must brace for DDoS attacks that are just as likely to be motivated by business interests as by ideological beliefs.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago