Skip to main content
Independent news from the heart of Darfur and Sudan
Watch live

Ongoing cyber-attacks on Sudanese newspaper

May 16 - 2016 KHARTOUM
Image of a DdoS attack. The assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with malware. Eventually, the assailant instructs the controlled machines to launch an attack against a specified target.
Image of a DdoS attack. The assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with malware. Eventually, the assailant instructs the controlled machines to launch an attack against a specified target.

The website of the independent electronic newspaper El Tareeg has been subjected to ongoing cyber-attacks disabling its functions from mid-March.

The newspaper said in a statement on Sunday that attacks on the site reached a climax on Thursday and Friday until Saturday morning. Saboteurs managed to disable some functions of the website before a technical team managed to resolve them and repair the malfunctions caused by the attack.

El Tareeg said the perpetrators used distributed denial of service (DDoS) attacks. Assailants use a bot that infects many vulnerable computer systems and instructs them to bombard a website with online traffic. This overloads the servers and causes a denial of service for regular users of the targeted system, making the website unreachable.

According to a US-based NGO, independent online news outlets are frequently subject to hacking attacks by what activists believe is the work of the Cyber Jihadist Unit. In its ‘Freedom of the Net 2015’ report, Freedom House said that several cyberattacks against critical news websites and activists’ social media accounts escalated around the April 2015 general elections.


Read the 'Freedom of the Net 2015 report' of Freedom House here

 


Back to overview