therecord.media
Open in
urlscan Pro
2606:4700:4400::ac40:9b4b
Public Scan
URL:
https://therecord.media/prorussian-hackers-claim-attacks
Submission: On August 24 via api from TR — Scanned from DE
Submission: On August 24 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Leadership * Cybercrime * Nation-state * People * Technology * Mobile App * About * Podcast * Contact Go SUBSCRIBE TO THE RECORD Subscribe Image: Denny Müller via Unsplash Daryna AntoniukAugust 9th, 2023 * Briefs * * * * * Get more insights with the Recorded Future Intelligence Cloud. Learn more. PRO-RUSSIAN HACKERS CLAIM ATTACKS ON FRENCH, DUTCH WEBSITES A pro-Russian hacking group has claimed responsibility for cyberattacks on government and public services websites in France and the Netherlands. The latest attacks come a week after the group, NoName057(16), hit Spanish and Italian government and private sector organizations with distributed denial-of-service (DDoS) attacks. The Dutch cybersecurity agency said in a statement on Tuesday that the impact of these DDoS attacks is “limited and symbolic.” Since the start of the war in Ukraine, the Netherlands has seen a surge in hacktivist groups carrying out cyberattacks on Dutch organizations and companies, the agency said. NoName057(16) listed Dutch public transport website, local bank SNS, the Groningen seaport, and the website of the municipality of Vlardingen among its targets. At the time of writing, these websites are still down. Such attacks flood targeted websites with junk traffic, making them unreachable. Back in June, NoName057(16) launched a cyberattack on the websites of the ports in the Dutch cities of Rotterdam and Groningen. Earlier this year, Dutch intelligence agencies warned the country’s maritime infrastructure, internet cables, gas pipelines, and wind farms are vulnerable to sabotage by Russia. In France, hackers claimed to have targeted the country’s customs service but the agency said on Tuesday that its website was down due to a planned “maintenance operation.” The website is still unavailable at the time of writing. The French financial regulator's website is also currently unavailable, reportedly due to a cyberattack. The message displayed on the website explains that it's temporarily undergoing maintenance, and users are unable to access or download any documents. NoName057(16) is known for its attacks on Ukraine and its allies. In March, it targeted Poland's tax service website, and in January hit the websites of candidates in the Czech presidential election. According to researchers at cybersecurity firm SentinelOne, NoName057(16)’s DDoS incidents cause “short-lived disruption with little to no wider consequence.” For its operations, the group mostly uses a DDoS attack toolkit called DDoSia. It has deployed the tool against government agencies, media, and private companies in Lithuania, Ukraine, Poland, Italy, and other European countries. * * * * * Tags * DDoS * Russia * Europe * NoName057(16) DARYNA ANTONIUK Daryna Antoniuk is a freelance reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post. Previous articleNext article Missouri says some Medicaid health information was compromised in MOVEit breach Attackers use EvilProxy phishing kit to take over executives’ Microsoft 365 accounts * Proposed bill would require vulnerability disclosure policies for all federal contractorsAugust 24th, 2023 * MacOS version of info-stealing XLoader gets an upgradeAugust 22nd, 2023 * Cyberattack on Belgian social service centers forces them to closeAugust 22nd, 2023 * Ukrainian hackers claim to leak emails of Russian parliament deputy chiefAugust 22nd, 2023 * Ecuador’s national election agency says cyberattacks caused absentee voting issuesAugust 21st, 2023 * Somalia bans TikTok, Telegram over ‘horrific' contentAugust 21st, 2023 * Tesla blames data breach affecting 75,000 on ‘insider wrongdoing’August 21st, 2023 * Australia’s .au domain administrator denies data breach after ransomware postingAugust 20th, 2023 * Illinois hospital notifies patients, employees of data breach after Royal gang postingAugust 18th, 2023 H1 2023: RANSOMWARE'S PIVOT TO LINUX AND VULNERABLE DRIVERS H1 2023: Ransomware's Pivot to Linux and Vulnerable Drivers THREAT ACTORS LEVERAGE INTERNET SERVICES TO ENHANCE DATA THEFT AND WEAKEN SECURITY DEFENSES Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken Security Defenses REDHOTEL: A PROLIFIC, CHINESE STATE-SPONSORED GROUP OPERATING AT A GLOBAL SCALE RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale BLUECHARLIE, PREVIOUSLY TRACKED AS TAG-53, CONTINUES TO DEPLOY NEW INFRASTRUCTURE IN 2023 BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023 BLUEBRAVO ADAPTS TO TARGET DIPLOMATIC ENTITIES WITH GRAPHICALPROTON MALWARE BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware * * * * * Privacy Policy © Copyright 2023 | The Record from Recorded Future News