top of page

Nigeria Enters the Crosshairs: Hider_Nex Claims DDoS Strikes on Federal Agencies

Nigeria under cyber attack.
Nigeria under cyber attack.

A pro-Palestinian hacktivist collective known as Hider_Nex has claimed responsibility for a coordinated distributed denial-of-service campaign against multiple Nigerian government websites. The alleged targets include the Lagos State Government, the Office of the Head of the Civil Service of the Federation, the Nigerian Maritime Administration and Safety Agency, the National Information Technology Development Agency, the National Primary Health Care Development Agency, the Nigeria Centre for Disease Control and Prevention, the National Agency for Food and Drug Administration and Control, and the National Universities Commission. The claim, posted on April 26 and amplified by the threat intelligence platform FalconFeeds.io, signals that Nigeria has been folded into a global cyber retaliation wave that practitioners can no longer afford to watch passively.


Who Is Hider_Nex

Hider_Nex is a Tunisian-linked, pro-Palestinian hacktivist outfit that emerged in mid-2025. The group operates a hack-and-leak playbook, pairing distributed denial-of-service strikes with data breaches to disrupt and embarrass targets. Since it surfaced, Hider_Nex has claimed operations against government and financial websites in Morocco, France, Israel, the United States, Bahrain, Kuwait, Cameroon, Egypt, and South Korea. Its current tempo is part of the broader retaliatory cyber wave that followed the United States and Israeli operation against Iran codenamed Epic Fury, in which more than a dozen hacktivist collectives have claimed roughly 150 distributed denial-of-service incidents across 16 countries.


What the Nigeria Claim Actually Says

The post circulating online is a self-claim, not a confirmed breach. It is accompanied by Check-Host snapshots showing brief unresponsiveness on the listed domains. Practitioners should read the artifact carefully:

  • The eight named platforms span state government, civil service, maritime safety, information technology policy, public health, drug regulation, and higher education.

  • The verification screenshots show momentary outages, not data exfiltration or service compromise.

  • As of publication, neither the Nigeria Computer Emergency Response Team nor the National Information Technology Development Agency has confirmed a sustained Nigeria DDoS attack.

  • No leaked records have surfaced on the group's known Telegram channel.


In intelligence terms, this is a credible claim by a known actor whose tradecraft matches the pattern, but the operational impact remains unverified.


Why This Matters for Nigeria

For African states, the lesson is structural rather than tactical. Nigeria is being drawn into a quarrel it did not start. The decisions that drive Hider_Nex are made in Tunis, Tehran, and Tel Aviv, but the disruption surfaces in Abuja and Lagos. Several implications stand out for the policy and practitioner community:


  1. Public-facing federal portals remain a soft underbelly. Many run on aging infrastructure with limited mitigation budgets.

  2. Health and education platforms are not symbolic targets. Outages at the Nigeria Centre for Disease Control or the National Universities Commission carry real public-service costs.

  3. African governments need a doctrine for cyber externalities, treating downstream hacktivist spillover from foreign conflicts as a national security issue, not an information technology nuisance.

  4. The information environment matters. Even unsuccessful attacks can erode public trust when amplified through social media without context.


The Path Forward

The Hider_Nex claim should be treated as an early warning rather than a final verdict. If the group escalates from availability strikes to data leaks, the reputational and regulatory cost will rise sharply. Federal and state agencies should validate their content delivery network protections, rehearse incident response, and coordinate disclosures through ngCERT before social media speculation sets the narrative.


OSRS supports public and private clients with threat intelligence monitoring, hacktivist actor profiling, executive briefings on geopolitical cyber risk, and tabletop exercises tailored to African operating environments. If your organization needs to understand its exposure to the next Hider_Nex-style claim, our team can help you build the analytic and protective posture to respond.


Enjoyed this article? Share it with a colleague who needs to read it, and subscribe to the OSRS email list for our next intelligence brief. Stay informed by following us on Google News, Twitter, and LinkedIn for more exclusive cybersecurity insights and expert analyses.


Author Bio

Dr. Sunday Oludare Ogunlana is Founder and CEO of OSRS, a Professor of Cybersecurity, and a national security scholar who advises global intelligence and policy bodies on hacktivist threats, geopolitical cyber risk, and African security affairs.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page