The threat actors used the "Slow HTTP" technique to overload the targeted servers and take down their hosted websites. Italy's Computer Security Incident Response Team (CSIRT) reported that the pro-Russian hacktivist group Killnet initiated DDoS attacks against government and military websites in the country. Killnet shuts down Italian government websites for standing with Ukraine.The phishing messages contained HTA files starting an attack chain leading to the deployment of the GammaLoad.PS1_v2 malware. The CERT-UA reported on another Gamaredon phishing campaign using lures related to the Battle of Kherson. Another phishing campaign unleashed by Gamaredon. ![]() While we expect associated cyberattacks will continue, going forward we’ll publish standalone blog posts covering major threats and security incidents as they occur. Next week, on Wednesday, May 25, we will publish the final edition of this ongoing blog. ![]() While state-sponsored cyberattacks were a major concern at the war’s outset, they’ve proven not to be as widespread a threat as initially feared. Unfortunately, the months-long conflict between Russia and Ukraine is unlikely to come to a clear resolution in the near future. The attackers used various techniques to initiate the DDoS attack, including code injections into advertising scripts, malicious Chrome extensions, and weaponized Docker containers. The attack that occurred at the beginning of the month, was generated by a botnet with 27,000 compromised devices, located in the United States, the United Kingdom, Japan, and Taiwan. The Russian state-owned bank Sberbank announced that it suffered the largest distributed denial-of-service (DDoS) attack in its history.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |