THANK YOU FOR SUBSCRIBING
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Gov CIO Outlook
THANK YOU FOR SUBSCRIBING
By
Government CIO Outlook | Tuesday, November 29, 2022
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
Russian-aligned hackers have claimed responsibility for a cyber attack on the European Parliament’s website.
FREMONT, CA:Hackers with ties to Russia have taken credit for a cyberattack on the website of the European Parliament. The pro-Russian hacker organisation Killnet launched a distributed denial of service (DDoS) attack against the website, forcing it to fall offline for around two hours. The group has frequently used this attack strategy in its ongoing attempts to target pro-Ukrainian authorities.
Russia's invasion of Ukraine, parliamentarians just agreed to name Russia as a state supporter of terrorism. At the moment, the president of the European Parliament tweeted that the website was under a sophisticated cyberattack. A pro-Russia organisation has taken ownership. IT specialists are fighting back and defending our systems. After we labelled Russia a state sponsor of terrorism.
Politicians voted to designate Russia as a state supporter of terrorism, but this is essentially a symbolic act because they lack the legal authority to carry out this decision. According to a statement from the European Parliament, the deliberate attacks and atrocities carried out by Russian forces and their proxies against civilians in Ukraine, the destruction of civilian infrastructure, and other grave violations of international and humanitarian law amount to acts of terrorism and constitute war crimes.
Via its Telegram channel, Killnet claimed credit for the attack. Strap-on shelling of the European Parliament's main website server section. As the vice president of tactical risk and response at Darktrace, It cannot be overstated the simplicity with which Killnet can launch these relatively low-sophistication attacks and make worldwide news. It can be as easy as typing a URL into their attack tool software and pressing run to execute an attack like this against one of their affiliates.
DDoS attacks, which are frequently quite simple to recover from, are Killnet's method of operation. Rather than causing any form of financial loss, the group uses these attacks to make a political statement and tarnish reputations. They must exercise caution when attributing cyberattacks to the Russian government because it can be challenging to determine the scope of state-level tasking, and the hazy boundaries between state-aligned, state-involved, and state-directed activities increase the risk of escalation, collateral damage, and misattribution. However, it does raise legitimate worries that these citizen-led activities can become more harmful or that states might employ these organisations as covert proxies.
Since the start of the Ukrainian conflict a year ago, Killnet has gained notoriety and has claimed responsibility for several attacks against various authorities and organisations that work against Russia's goals. Italy has been a major focus for the group, and over the past several months, the nation has been the subject of numerous attacks against organisations within it. The Italian municipality of Palermo, in the event, is thought to have featured ransomware. In May, Killnet launched a wave of attacks against organisations with connections to Italy. Soon after removing Soviet monuments from a region predominantly populated by ethnic Russians, Estonia successfully endured and survived its biggest widespread cyber strike since 2007. This attack was again linked to Killnet.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
However, if you would like to share the information in this article, you may use the link below:
www.govciooutlookapac.com/news/killnet-claims--ddos-attack--on-eu-parliament-website-nid-1805.html