Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

Stucx Team (Hacktivists) – Threat Actor

February 16, 2025
Reading Time: 4 mins read
in Threat Actors
Stucx Team (Hacktivists) – Threat Actor

Stucx Team

Location

Malaysia

Date of Initial Activity

2023

Suspected Attribution 

Hacktivists

Motivation

Hacktivism

Software

Website

Overview

The Stucx Team is a Malaysian hacktivist group that has been active since at least March 2023. Initially, the group focused on launching distributed denial-of-service (DDoS) attacks against Indian entities, reflecting their strong political stance and willingness to use cyberattacks as a tool to express ideological beliefs. The Stucx Team’s early operations were marked by a strategic approach, targeting critical sectors in India, such as government organizations and businesses, to disrupt their operations and raise awareness about their cause. However, the group’s focus evolved as global geopolitical events shifted. Following the onset of the Israel-Hamas conflict on October 7, 2023, the Stucx Team redirected its efforts toward Israeli organizations, carrying out a series of cyberattacks, including high-profile DDoS campaigns. The group’s rapid shift in targets highlights their responsiveness to real-time global political developments and their adaptability in leveraging cyber tactics to further their agenda.

Common targets

Information

Public Administration

Retail Trade

France

India

Israel

Attack Vectors

Web Browsing

How they operate

DDoS Attacks
One of the core tactics used by Stucx Team is DDoS attacks. These attacks overwhelm a target’s servers with an excessive volume of traffic, making the service unavailable to legitimate users. To carry out these attacks, the group may leverage botnets, networks of compromised devices, to generate massive amounts of traffic. The group’s ability to launch sustained DDoS attacks on targets—particularly critical infrastructure—demonstrates their proficiency in causing widespread disruption. In addition to traditional DDoS techniques, Stucx Team may also utilize more sophisticated methods, such as amplification attacks, which exploit the characteristics of certain internet services to exponentially increase the traffic directed at a target.
Website Defacement
Alongside DDoS attacks, the Stucx Team frequently engages in website defacement campaigns. This tactic involves altering the content of a target website to display messages that align with their political or ideological views. The group generally gains unauthorized access to a target’s website through exploiting vulnerabilities in web applications or Content Management Systems (CMS). Stucx Team has been known to target various website platforms by leveraging SQL injection, cross-site scripting (XSS), and unpatched security flaws in plugins or scripts. Once the attackers successfully breach the site, they replace the content with politically charged messages, often with the goal of drawing attention to their cause.
Target Selection and Tactics
Stucx Team’s selection of targets is highly strategic, driven by geopolitical events and their own ideological goals. For instance, during the Israel-Hamas conflict, the group redirected its operations to target Israeli organizations, emphasizing its politically motivated nature. In these attacks, Stucx Team often focuses on sectors such as government websites, media platforms, and corporate entities that hold significance in the targeted region. Their DDoS attacks and defacements are carefully coordinated, typically beginning with a public announcement on encrypted communication channels such as Telegram, where the group calls for others to join their cause and amplify the attacks.
Operational Coordination
Stucx Team’s operations also benefit from tight coordination among its members, leveraging secure communication platforms and distributed decision-making processes. Given the group’s evolving objectives and their active participation in global political movements, the Telegram channels used by the group serve as a hub for both command-and-control (C2) operations and recruitment. These channels enable the group to quickly mobilize resources, share tools, and distribute new instructions for ongoing operations. This decentralized structure allows the group to act quickly, launching a campaign in response to real-time events and maintaining operational security.  
References:
  • Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
Tags: BotnetsDDoSFranceHacktivismHacktivistsHamasIndiaIsraelMalaysiaSQL injectionStucx TeamThreat Actors
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial