therecord.media Open in urlscan Pro
2606:4700:4400::ac40:9b4b  Public Scan

URL: https://therecord.media/prorussian-hackers-claim-attacks
Submission: On August 24 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go


SUBSCRIBE TO THE RECORD

Subscribe

Image: Denny Müller via Unsplash
Daryna AntoniukAugust 9th, 2023
 * Briefs

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


PRO-RUSSIAN HACKERS CLAIM ATTACKS ON FRENCH, DUTCH WEBSITES

A pro-Russian hacking group has claimed responsibility for cyberattacks on
government and public services websites in France and the Netherlands.

The latest attacks come a week after the group, NoName057(16), hit Spanish and
Italian government and private sector organizations with distributed
denial-of-service (DDoS) attacks.

The Dutch cybersecurity agency said in a statement on Tuesday that the impact of
these DDoS attacks is “limited and symbolic.”

Since the start of the war in Ukraine, the Netherlands has seen a surge in
hacktivist groups carrying out cyberattacks on Dutch organizations and
companies, the agency said.

NoName057(16) listed Dutch public transport website, local bank SNS, the
Groningen seaport, and the website of the municipality of Vlardingen among its
targets. At the time of writing, these websites are still down. Such attacks
flood targeted websites with junk traffic, making them unreachable.

Back in June, NoName057(16) launched a cyberattack on the websites of the ports
in the Dutch cities of Rotterdam and Groningen.

Earlier this year, Dutch intelligence agencies warned the country’s maritime
infrastructure, internet cables, gas pipelines, and wind farms are vulnerable to
sabotage by Russia.

In France, hackers claimed to have targeted the country’s customs service but
the agency said on Tuesday that its website was down due to a planned
“maintenance operation.”

The website is still unavailable at the time of writing.



The French financial regulator's website is also currently unavailable,
reportedly due to a cyberattack. The message displayed on the website explains
that it's temporarily undergoing maintenance, and users are unable to access or
download any documents.



NoName057(16) is known for its attacks on Ukraine and its allies. In March, it
targeted Poland's tax service website, and in January hit the websites of
candidates in the Czech presidential election.

According to researchers at cybersecurity firm SentinelOne, NoName057(16)’s DDoS
incidents cause “short-lived disruption with little to no wider consequence.”

For its operations, the group mostly uses a DDoS attack toolkit called DDoSia.
It has deployed the tool against government agencies, media, and private
companies in Lithuania, Ukraine, Poland, Italy, and other European countries.

 * 
 * 
 * 
 * 
 * 

Tags
 * DDoS
 * Russia
 * Europe
 * NoName057(16)


DARYNA ANTONIUK



Daryna Antoniuk is a freelance reporter for Recorded Future News based in
Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe
and the state of the cyberwar between Ukraine and Russia. She previously was a
tech reporter for Forbes Ukraine. Her work has also been published at Sifted,
The Kyiv Independent and The Kyiv Post.

Previous articleNext article
Missouri says some Medicaid health information was compromised in MOVEit breach
Attackers use EvilProxy phishing kit to take over executives’ Microsoft 365
accounts

 * Proposed bill would require vulnerability disclosure policies for all federal
   contractorsAugust 24th, 2023
 * MacOS version of info-stealing XLoader gets an upgradeAugust 22nd, 2023
 * Cyberattack on Belgian social service centers forces them to closeAugust
   22nd, 2023
 * Ukrainian hackers claim to leak emails of Russian parliament deputy
   chiefAugust 22nd, 2023
 * Ecuador’s national election agency says cyberattacks caused absentee voting
   issuesAugust 21st, 2023
 * Somalia bans TikTok, Telegram over ‘horrific' contentAugust 21st, 2023
 * Tesla blames data breach affecting 75,000 on ‘insider wrongdoing’August 21st,
   2023
 * Australia’s .au domain administrator denies data breach after ransomware
   postingAugust 20th, 2023
 * Illinois hospital notifies patients, employees of data breach after Royal
   gang postingAugust 18th, 2023


H1 2023: RANSOMWARE'S PIVOT TO LINUX AND VULNERABLE DRIVERS


H1 2023: Ransomware's Pivot to Linux and Vulnerable Drivers


THREAT ACTORS LEVERAGE INTERNET SERVICES TO ENHANCE DATA THEFT AND WEAKEN
SECURITY DEFENSES


Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken
Security Defenses


REDHOTEL: A PROLIFIC, CHINESE STATE-SPONSORED GROUP OPERATING AT A GLOBAL SCALE


RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale


BLUECHARLIE, PREVIOUSLY TRACKED AS TAG-53, CONTINUES TO DEPLOY NEW
INFRASTRUCTURE IN 2023


BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New
Infrastructure in 2023


BLUEBRAVO ADAPTS TO TARGET DIPLOMATIC ENTITIES WITH GRAPHICALPROTON MALWARE


BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News