Home / News / Technology / Hacktivist Group RipperSec Claims DDoS Attack on Trump-Musk Interview – Fake News?
Technology
3 min read

Hacktivist Group RipperSec Claims DDoS Attack on Trump-Musk Interview – Fake News?

Published August 15, 2024 9:40 AM
James Morales
Published August 15, 2024 9:40 AM

Key Takeaways

  • The hacker group RipperSec has claimed responsibility for Monday’s DDoS attack against X.
  • The X website was brought down during an interview between Donald Trump and Elon Musk.
  • RipperSec has targeted a range of “Zionist allies” in recent times.

A pro-Palestinian hacktivist group known as RipperSec has claimed responsibility for Monday’s DDoS (Distributed Denial of Service) attack against X during Elon Musk and Donald Trump’s interview on the platform.

The group also claims to have targeted websites operated by Uber, Ferrari, Paramount, and others in recent days. But in reality, anyone can attempt to take credit for DDoS attacks. Proving who is actually behind them is more difficult.

What is a DDoS Attack?

As the name implies, a Distributed Denial of Service attack floods a server with internet traffic from a distributed network of machines to prevent legitimate users from accessing a website or application.

First popularized by the Anonymous movement in the 2010s, early DDoS operations relied on large groups orchestrating the attack. But these days, networks of computers infected with malware known as botnets can be as effective as thousands of individual hackers. 

In RipperSec’s Telegram channel, group members have reported using a botnet based on a version of the Medusa Malware strain.

RipperSec’s Claim is Dubious

Although the collective is clearly active, there is no evidence to support their claim that they were behind the DDoS attack that brought down X on Monday.

Screenshot from RipperSec Telegram channel.
Screenshot from RipperSec Telegram channel.

Unlike other attacks the group has taken responsibility for, RipperSec didn’t broadcast any details about the X DDoS until hours after the event took place. 

The Rise of Anti-Zionist Hacking

A range of political motivations inform RipperSec’s hacking activity. For example, it claims to have targeted gambling websites and phishing scams. In recent weeks, it has launched attacks against Bangladeshi banks and government agencies over the state’s treatment of protesters.

However, most of RipperSec’s DDoS activity in 2024 has targeted Israeli companies and organizations that are seen to be supportive of Zionism. 

In a “warning to all Zionist allies” posted to the group’s Telegram channel, RipperSec said: “We will attack your infrastructure, communication and important websites. After this there will be no more mercy on Israel’s allies as we have been gentle by avoiding important websites but you all are still blind and ignorant of human rights and freedoms. We will not stop our attacks until you all care about this issue.”

The group, which mostly communicates in Arabic, English and Malay, has formed alliances with other politically aligned hackers, including SylhetGang, StucxTeam, NetGhostSec and KhalifaCyberCrew.

Was this Article helpful? Yes No