There's usually an element of that with cracking passwords. Even if you just try and pick a good wordlist for a target you're already engaging in a way. The more you know about them the shorter the wordlist. And if you spend enough time getting to know shit about them you can reduce the wordlist to one entry because they told you the password. In a way. It's not necessarily a completely different process is my point.
You can argue it's a classic ID-10T error in your workflow.
But nobody has discovered a security vulnerability within the system architecture. This is the system operating as designed, abet with the wrong person standing in front of the terminal.
313 Team is an Arabic-interest hacker collective, aligned with Iran, Palestine and Iraq, they reportedly used a distributed denial of service (DDoS) attack against Truth Social.
The article seems pretty clear to me. Maybe it was updated?
In order to launch a meaningful DDoS there must be thousands of compromised machines to use. I would absolutely say compromising such a large amount of machines is hacking.
Or they just found a buffer overflow bug on their border router/firewall. I can't imagine Truth Social has a keen network engineering team keeping up to patching and vulnerabilities.