CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 20, 2026

Bluesky Disrupted by Sophisticated DDoS Attack

Security Week Archived Apr 20, 2026 ✓ Full text saved

A pro-Iran hacker group has taken credit for the attack on Bluesky, which appears to have lasted 24 hours. The post Bluesky Disrupted by Sophisticated DDoS Attack appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Bluesky, the decentralized microblogging social media platform, reported service outages last week due to a distributed denial-of-service (DDoS) attack aimed at its systems. The DDoS attack appears to have started late on April 15 (Pacific Time) and continued into the next day. The company described it as a sophisticated attack that caused intermittent app outages.   “The attack is impacting our application, with users experiencing intermittent interruptions in service for their feeds, notifications, threads and search,” Bluesky said. “We have not seen any evidence of unauthorized access to private user data,” it added. The company did not say who was behind the attack. A hacker group called 313 Team took credit for taking down the social media service, but their claims have not been independently verified.  313 Team, also known as ‘Islamic Cyber Resistance in Iraq’, claims to be a pro-Iran hacktivist group. The hackers have been active during the ongoing conflict between the United States, Israel, and Iran. While these types of groups may be capable of launching disruptive attacks — they are often a persona used by government agencies — they have been known to make exaggerated or false claims.  In the statement announcing the attack, 313 Team said the attack was expected to last for 3 hours, but based on Bluesky’s status updates the DDoS attack lasted for roughly 24 hours.  Bluesky said it managed to mitigate the attack and prevent extended service outages, despite the assault continuing.  Related: 53 DDoS Domains Taken Down by Law Enforcement Related: Evasive Masjesu DDoS Botnet Targets IoT Devices Related: German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack Related: Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps WRITTEN BY Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Another DraftKings Hacker Sentenced to Prison Recent Apache ActiveMQ Vulnerability Exploited in the Wild ZionSiphon Malware Targets ICS in Water Facilities OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal Data Breach at Tennessee Hospital Affects 337,000 Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking Contest Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments Exploited Vulnerability Exposes Nginx Servers to Hacking Latest News Hackers Abuse QEMU for Defense Evasion Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House Half of the 6 Million Internet-Facing FTP Servers Lack Encryption Next.js Creator Vercel Hacked Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology CoChat Launches AI Collaboration Platform to Combat Shadow AI Trending Webinar: A Step-By-Step Approach To AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Anti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors. ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer. Thomas Bain has been appointed Chief Marketing Officer at Silent Push. More People On The Move Expert Insights Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules Of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    Apr 20, 2026
    Archived
    Apr 20, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗