Hacker Group Claims Responsibility for OpenAI Outage, Citing Israel Connections

OpenAI reported “periodic outages” on Wednesday, attributing them to an “abnormal traffic pattern”

Advertisements

A hacking group, self-identified as Anonymous Sudan, and allegedly linked to Russia, has asserted responsibility for intermittent disruptions experienced by OpenAI’s ChatGPT earlier this week. The group claimed it targeted the Microsoft-backed startup due to its perceived association with Israel.

Anonymous Sudan made the announcement on the Telegram messaging app, citing OpenAI’s exploration of investment opportunities in Israel as the primary motive for their cyberattacks. OpenAI reported “periodic outages” on Wednesday, attributing them to an “abnormal traffic pattern” indicative of a distributed denial of service (DDoS) attack.

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular functioning of a network, service, or website by overwhelming it with a flood of internet traffic. In a DDoS attack, multiple compromised computers or devices are used to generate and send a massive amount of traffic to a target, with the intention of causing a service outage or making it extremely slow and unreliable.

Approximately 100 million users weekly engage with ChatGPT, the AI platform that gained global attention upon its introduction a year ago. While OpenAI did not explicitly identify the source of the alleged attack, the company has since resolved the issue that led to elevated error rates across its software and AI platform.

This incident follows Anonymous Sudan’s track record of high-profile DDoS attacks this year, targeting Microsoft services, NATO, the European Investment Bank, media organizations, airlines, and power companies. The group claims to be a “hacktivist” entity operating from Africa on behalf of oppressed Muslims globally, but cybersecurity researchers often link its activities to Russia, aligning with Kremlin priorities.

Tensions between Israel and Russia have escalated, with Anonymous Sudan previously claiming responsibility for cyberattacks targeting Israeli organizations. The group’s actions align with pro-Kremlin goals, according to cybersecurity analysts at Netscout.

Despite Anonymous Sudan’s denial of working for Russia in a June interview with Bloomberg News, its attacks, often effective due to targeting the application layer of victims’ internet infrastructure, have consistently mirrored Russia’s geopolitical interests.

The Kremlin regularly denies involvement in hacking operations. Cybersecurity experts highlight the effectiveness of Anonymous Sudan’s attacks in overloading web servers and forcing them offline, emphasizing the vulnerability of the application layer in such incidents. The situation underscores the ongoing challenges posed by cyber threats in the increasingly interconnected digital landscape.

Note: The information provided is based on claims made by the hacking group and OpenAI’s official statements.

Join 16 other subscribers

Advertisements

audible - now streaming: podcasts, originals, and more. Start your free trial.

Advertisements

Amazon business - everything you love about amazon. for work - learn more

Advertisement

Advertisements

Trending Topics

AI Business Consumer cyber-security cybersecurity Email Gaming Government Hacking Home Malware Mobile Open Source Phishing Privacy Scams security Shopping technology Vulnerabilities

More News

Podcast Corner

Cybersecurity Awesomeness Podcast – Episode 154 Cybersecurity Awesomeness Podcast

In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the radical evolution of exploit triage following the RSAC 2026 conference. They highlight Anthropic’s "Mythos," a sophisticated red-teaming AI capable of autonomously discovering and chaining vulnerabilities without human oversight. Unlike traditional hacking methods that rely on static kits, modern AI toolkits can scan massive IP ranges for every vulnerability in history—essentially automating the "needle in a haystack" search for attackers. This shift is particularly dangerous for legacy environments—essentially creating "Terminator" moments for infrastructure—where Windows XP embedded is still found in modern EV chargers.Citing Shodan statistics, the hosts reveal the alarming presence of public-facing legacy systems: approximately 5,000 instances of Windows Vista/Server 2008, 2,000 Windows Server 2003 systems, and 4 public Windows XP servers running IIS. Steffen and Buckler conclude that we have entered an "AI arms race" where automated adversaries outpace manual defenses, making continuous scanning and robust cyber hygiene vital for survival.

Leave a comment

Discover more from Cyber News Gator

Subscribe now to keep reading and get access to the full archive.

Continue reading