Microsoft Azure, Outlook DDoS attacks linked to Anonymous Sudan

June 19, 2023

Microsoft has confirmed that recent disruptions to its Azure, Outlook, and OneDrive web portals were the result of Layer 7 DDoS attacks carried out by the threat actor Storm-1359, who goes by the name Anonymous Sudan.

Layer 7 DDoS attacks focus on overwhelming the application layer by bombarding services with an overwhelming volume of requests, causing the services to become unresponsive. Anonymous Sudan, also known as Storm-1359, employs three specific types of Layer 7 DDoS attacks: HTTP(S) flood attacks, Cache bypass, and Slowloris. Each method aims to exhaust the web service’s available connections, rendering it unable to accept new requests.

The attacks began in early June 2023, and targeted Microsoft’s web-accessible portals for Outlook, Azure, and OneDrive. Anonymous Sudan demanded a payment of $1 million to cease the attacks.

Microsoft revealed that the attackers likely employed multiple virtual private servers (VPS), rented cloud infrastructure, open proxies, and DDoS tools to carry out the attacks. However, there is no evidence to suggest that customer data was compromised during these incidents.

The group claimed that their attacks on Outlook were in response to the United States’ involvement in Sudanese politics. However, some cybersecurity researchers suspect that this claim may be a false flag, suggesting a potential connection between the group and Russia.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn