Keymous+: The Hacktivist Collective Redefining DDoS Warfare

Emerging in 2023 and expanding rapidly between February and September 2025, Keymous+ is making waves globally.

The self-titled hacktivst collective is known for its crippling Distributed Denial of Service (DDoS) attacks across a wide variety of industries and geographies.

Their cyber attacks emphasize scale and obfuscation, often involving thousands of sources, widespread IP/ASN spoofing, and the use of DNS amplification techniques to maximize bandwidth, making attribution increasingly difficult.

Let‘s dive into the world of Keymous+ to better understand how they operate, who they‘re targeting, and what they‘re aiming to achieve.

An X post sharing the rise in Keymous+ attacks globally in 2025.

Who is Keymous+?

Keymous+ is a hacktivist group that emerged in 2023. However, in 2025, the North African hackers increased their frequency of attacks.

Over 700 DDoS attacks globally were self-attributed to Keymous+, with victims in France, India, Morocco, the UAE, Israel, Sudan, and Saudi Arabia. However, only 249 of those attacks have been independently confirmed.

Figure 1. A chart showing the countries targeted by Keymous+ in 2025. Source: Radware

Government entities comprise 27.6% of their targets, making them the primary focus of Keymous+ operations, while Telecoms (10%) and Financial services (6.5%) are the next most-targeted sectors.

Figure 2. A chart showing the targeted industries by Keymous+ in 2025. Source: Radware

It‘s clear that the group goes after high-value targets to cause maximum damage. The threat actor profile performed by NETSCOUT underlines the opportunistic nature of attacks, while the concentration of attacks in the Middle East and North Africa suggests geopolitical motivations.

What are their motivations?

Despite being a hacktivist group, Keymous+ has a clear lack of ideological consistency. They espouse slogans like “Hack for Humanity”, aligning with other popular hacktivists such as #OpIndia and #OpIsrael, but act contrary to any supposed beliefs. For this reason, analysts have classed them as opportunistic hackers.

How is the group organized?

According to Telegram threat intelligence, Keymous+ has a unique setup, different from many other hacker groups.

The Keymous+ team is comprised of:

  • “Alpha Team” is in charge of data breaches and leaks, although in recent months, they have been observed as inactive.
  • “Beta Team” focuses exclusively on DDoS attack operations.
Figure 3. A screenshot of a Keymous+ post announcing the current inactivity of Alpha Team. Source: Radware

Keymous+ threat actors are therefore more effective, separating their workforce to get more done in less time.

The Keymous+ approach: EliteStress and DDoS-for-hire

Keymous+ cyberattacks are one prong of their approach. As hybrid threat actors, they not only launch attacks but also sell commercial products to prop up their activity.

Figure 4. A screenshot of a Keymous+ post marketing EliteStress to other threat actors. Source: Radware

EliteStress, a supposedly self-made platform that features a comprehensive attack panel, makes it easier for threat actors to bypass modern DDoS protection systems. Although the group doesn‘t publicly admit to ownership, they do advertise the service on Telegram and X to attract new users.

The pricing for the platform ranges from €5 per day to €600 per month, making it affordable for most hackers.

Figure 5. A screenshot of the EliteStress pricing tiers. Source: Radware

What does EliteStress do? Apart from providing DDoS-for-hire services, the platform also:

  • Includes DNS amplification attack infrastructure, helping threat actors leverage public DNS servers to amplify traffic volumes.
  • Can perform User Datagram Protocol (UDP) flood attacks targeting specific ports and protocols.
  • Provides advanced HTTP/2 flood techniques that can overwhelm web servers with legitimate-looking requests.
  • Allows spoofed SSH or ICMP traffic to execute brute-force attacks while evading attribution.

EliteStress boasts stable performance, with bots, tools, and connections to external platforms. Telegram handles like “Join_Elite” try to draw new users in by sharing discounted services or integration with Telegram bots.

Partnerships with other hacker groups

The launch of EliteStress attracts cooperation with other hacktivist entities—leveraging each other‘s skills and geography to launch grand-scale attacks. Experts suggest that collaborations may also serve as marketing opportunities to promote shared infrastructure.

According to open-source intelligence, Keymous+ has been linked to other threat actor groups such as NoName057(16), DDoS54, Mr Hamza, AnonSec, Rabbit Cyber Team, Hunter Killerz, and Moroccan Dragons.

In one case, the Keymous+ group joined forces with other hackers to launch “Red Eye Op.” However, little information about this operation is public.

An X post sharing a new alliance between ShadowX and Keymous+.

Keymous+ TTPs: Case studies and attack methods

Many of the alleged methods used in Keymous+ cyberattacks are speculative and require further confirmation from independent sources.

The TTPs used by Keymous+ are as follows:

TacticTechniqueProcedureExplainer
Resource developmentT1583
Acquire Infrastructure

Use of DDoS-for-hire services
Leverages EliteStress, a DDoS-as-a-Service platform.
Initial accessT1190
Exploit Public-Facing Application
Targeting web vulnerabilitiesExploits vulnerabilities in public facing web applications to intiate DDoS attacks, verified via Check-Host.net.
ExecutionT1569
System Services

DDoS attack execution
Deploys EliteStress to flood target systems with traffic, disrupting the availability of websites and services.
Command-and-Control (C2)T1071
Application Layer Protocol
Telegram-based coordinationUses Telegram to coordinate attacks, select targets, and provide proof of attacks.
CollectionT1596
Search Open Technical Databases
Reconaissance via Check-Host.netEmploys Check-Host.net to verify target downtime and share evidence, enhancing visibility and credibility.
ImpactT1498
Network Denial of Service
High volume DDoS attacksConducts DDoS attacks against high-visibility sectors.
ExfiltrationT1537
Transfer Data to Cloud Account

Data sharing via Telegram and X

Shares attack outcomes and proof-of-distribution on Telegram and X, recruiting support and publicizing impact.
CollaborationT1588
Obtain Capabilities
Alliances with hacktivist groupsPartners with other hacker collectives including, NoName057(16), DDoS54, Mr Hamza, AnonSec, Rabbit Cyber Team, Hunter Killerz, and Moroccan Dragons.

Observed attack vectors for Keymous+ attacks include:

  • DNS amplification: Threat actors exploit misconfigured DNS servers to amplify traffic volume against targets.
  • UDP floods: High-volume floods using UDP packets are used to overwhelm bandwidth and services.
  • TCP SYN floods: Attackers send massive SYN requests to exhaust server resources.
  • Layer 7 HTTP floods: Application-level floods target websites and APIs.
  • Collaborative botnet attacks: Hackers partner with other groups to scale up attacks.
  • IP/ASN spoofing: IP source addresses or the network ID are falsified, obfuscating traffic origins.
  • Website defacement: Targets government and institutional websites to cause humiliation.
  • Opportunistic data exfiltration: While there is limited evidence, some DDoS campaigns suggest data theft.
  • Psychological operations: Social media platforms such as Telegram and X are used to amplify impact and claim responsibility.

To better understand the hacktivist collective, let‘s delve into the latest news from observed attacks throughout 2025.

1. German banks, companies, and government authorities’ sites go down after DDoS attack

Working together with prolific Russian hackers NoName057(16), Keymous+ used their expertise to take down several key German websites in April 2025. Sites affected included the web portal for the federal and state government, the federal tax office, the Bavarian state bank, and multinational corporation Lidl.

An X post sharing screenshots from Telegram and victim websites relating to the Keymous+ and NoName057(16) collaboration against German infrastructure.

2. Telecoms disrupted across France

In July 2025, Keymous+ claimed responsibility for a DNS amplification attack against telecom providers in France. The hacktivists overwhelmed the telecom‘s services by exploiting misconfigured DNS servers. Claimed victims included SFR, the second-oldest mobile operator, and Bouyges Telecom, the third-oldest operator in the country.

An X post showcasing the DNS amplification attacks performed in France.

3. Sudan hacktivism affects critical infrastructure across the country

In August 2025, the hacktivist collective went after Sudan, focusing on government and critical infrastructure. Websites affected included the Federal Government, the Ministry of Finance, the Sudan Railway Corporation, the Taxation Chamber, and Sudatel Telecom Group. The motivation of the attack seems to be bringing an end to the current civil war.

An X post sharing details of Keymous+ claims of targeting Sudan‘s government and critical infrastructure.

4. Disruption to government services in Morocco

In September 2025, Keymous+ claimed to have attacked government websites in Morocco, including the Ministry of Health and Morocco‘s National ID Portal. However, third parties have yet to confirm this attack.

An X post sharing Keymous+ claimed attacks on government websites in Morocco.

5. Hacktivists disrupt Pakistan during ongoing Kashmir conflict

In November 2025, Keymous+ narrowed in on Pakistan, taking down numerous state sites as geopolitical tensions continue to rise in the region. Notable sites compromised by the DDoS attacks include Saif Power Limited, Ufone Pakistan, the Water and Development authorities, and an electric power supplier. Some experts suggest that these attacks may be falsified or exaggerated for publicity.

An X post sharing details of an attack on Pakistan‘s critical infrastructure.

Practical solutions for CISOs to prevent Keymous+ attacks

Preventing cyber threats before they escalate is essential for maintaining good security posture. Especially if your organization is located within regions that face geopolitical conflict or align with sectors that support critical infrastructure.

  1. Treat suspicious activity as a persistent threat: Keymous+ is known for persisting within IT ecosystems. Design your incident plan around persistence, speed, and scale, ensuring rapid detection, thorough forensics, hardening protocols, and regional escalation pathways. Running regular tabletop exercises that simulate repeated activations can be a useful way to prepare teams.
  2. Prioritize telemetry and vendor SLAs: Retaining high-resolution NetFlow and PCAPs at the edge ensures fast access for the first minutes of an event, keeping flow telemetry at scale for accurate DDoS attack source detection.
  3. Harden edge and application controls: It‘s important to strengthen your defenses at the edge of networks and within applications to better weather an attack. Enabling SYN cookies and adjusting TCP settings reduces the likelihood of a SYN flooding attack, while bot protection (such as using CAPTCHA) helps teams to spot and slow down automated attacks.
  4. Coordinate regionally: If your organization is spread across geographies, coordination is your best bet. Ensure ISPs are configured to block “fake” traffic and apply filters when needed, set up clear escalation pathways with reputable providers local to the region, and map regional dependencies (including DNS, CDNs, and transit providers) in case regional providers are impacted.

FAQs

What are the early warning signs of a Keymous+ attack?

Catching the early signs of an attack is essential to thwarting a hacker‘s goals. Early detection reduces downtime, reduces reputational damage, and prevents attackers from using the initial compromise for deeper intrusions.

Organizations should look out for suspicious activity such as:

  • Sudden spikes in traffic from unusual geographies (especially from North Africa and the Middle East, where many hackers are located).
  • Repeated SYN/UDP requests that overwhelm servers.
  • Unauthorized admin logins, especially if they fall outside your timezone.
  • Social media chatter claiming responsibility for attacks against your sector.

How can you protect your organization against rising DDoS attack threats?

DDoS attacks overwhelm the target server, network, or application with traffic, causing it to go offline. Often, attackers use malware to infect IoT devices, adding the victim‘s systems to an existing botnet, causing further damage to more targets in the future.

To decrease the chances of experiencing a DDoS attack, organizations can harden their DNS infrastructure, such as disabling open resolvers and implementing query rate limiting. A web-application firewall (WAF) is a useful tool for mitigation, while establishing connection limits can limit TCP SYN floods by validating digital handshakes per IP address.

How can organizations protect themselves against becoming part of a botnet?

Becoming part of a botnet compromises your cybersecurity efforts as an organization. To reduce this risk, leverage packet-level insights for network detection and response (NDR) solutions.

Investigating cyber threats in real-time by leveraging packet-level data to identify suspicious activity across your IT ecosystem supports critical infrastructure security.

What is the rate of malicious traffic that has been observed during a Keymous+ cyberattack?

To measure cyberattacks, researchers look at the rate of data arriving in your network and whether it can saturate the provisioned transit.

Individual Keymous+ attacks have been observed peaking at 11.8Gbps; however, collaborative attacks have peaked at 44Gbps. An approximate 4x increase in attack bandwidth indicates a large botnet network, usually reliant on DDoS-for-hire resources.

What infrastructure is used by Keymous+ to launch their attacks?

Keymous+ uses a wide variety of infrastructure to launch its attacks. TOR exit nodes, public cloud instances, compromised Internet of Things (IoT) devices, commercial VPN/proxy services, and directly infected hosts enable the hacktivist collective to continue damaging private and government organizations.

According to analysts, most source IPs appear to be spoofed, leveraging modern DDoS-for-hire platforms that offer simple dropdown menus to spoof Autonomous System Numbers (ASNs) and IP addresses from major service providers and cloud platforms.

How does Keymous+ use Telegram to orchestrate their attacks?

Keymous+ hacktivists use the social media platform Telegram to coordinate and promote their attacks. Telegram is used as a propaganda tool to legitimize their image as a hacktivist collective, attracting followers, sympathizers, and potentially new recruits.

Telegram boasts less oversight than other social media platforms, allowing threat actors to share files and circulate tools, scripts, and instructions to boost cyber attacks.

For threat intelligence purposes, Telegram posts can provide insights into potential indicators of compromise (IoCs) such as IP addresses, domains, and usernames.

What additional risks do Keymous+ attacks pose?

According to NETSCOUT researchers, the scale and variety of sources indicate that Keymous+ leverages multiple botnets to execute its DDoS attacks. This means that each time an organization is compromised, it could be added to the botnet for future attacks.

Wrapping up

The growing threat of hacktivism requires organizations to be prepared for sustained attacks at an increasing scale. Hackers are becoming stronger with each innovation, making it more important than ever to keep systems and threat detection methods up to date.

CybelAngel can support your threat intelligence efforts, strengthening your security posture in uncertain times. CISOs and security professionals can stay one step ahead with real-time threat monitoring to sidestep targeted attacks.

About the author