therecord.media Open in urlscan Pro
2606:4700::6812:1c78  Public Scan

URL: https://therecord.media/ddos-denmark-us-russia-killnet/
Submission: On February 04 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://therecord.media/

<form role="search" method="get" class="search-form" action="https://therecord.media/">
  <input type="text" placeholder="Search" value="" name="s">
  <input type="submit" value="go">
</form>

<form class="search-form">
  <a href="#">
<i class="fas fa-search search-icon"></i>
<i class="fas fa-times close-icon"></i>
</a>
</form>

GET https://therecord.media/

<form role="search" method="get" class="search-form" action="https://therecord.media/">
  <input type="text" placeholder="Search" value="" name="s">
  <input type="submit" value="go">
</form>

POST

<form action="" method="post" class="newsletterForm">
  <input type="email" name="email" placeholder="your e-mail address">
  <input type="hidden" name="newSubscription" value="1">
  <input type="submit" value="go">
</form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept
Manage consent
We use cookies to optimize our website and our service. Cookie Policy

Functional

Marketing
Accept allDismissPreferences
 * Leadership
 * Cybercrime
 * Nation-state
 * Government
 * People
 * Technology

 * About
 * Contact
 * Click Here Podcast

 * 




SUBSCRIBE TO THE RECORD



Jonathan Greig January 31, 2023


PRO-RUSSIAN DDOS ATTACKS RAISE ALARM IN DENMARK, U.S.

Briefs
Cybercrime
Government
 * 
 * 
 * 
 * 
 * 

Jonathan Greig

January 31, 2023

 * Briefs
 * Cybercrime
 * Government

 * 
 * 
 * 
 * 
 * 


PRO-RUSSIAN DDOS ATTACKS RAISE ALARM IN DENMARK, U.S.

Distributed denial-of-service (DDoS) attacks by pro-Russian hacking groups are
causing alarm in the U.S. and Denmark after several incidents affected websites
of hospitals and government offices in both countries. 

On Tuesday, Denmark announced that it was raising its cyber risk alert level
after weeks of attacks on banks and the country’s defense ministry. 

“We are again raising the threat level for cyber risk against Denmark, among
other things on the basis of pro-Russian activist hacker groups’ high level of
activity against NATO countries, including Denmark, as well as their increased
capacity,” Denmark’s Centre for Cyber Security said on Twitter.

The center said the DDoS incidents — which involve routing a deluge of page
requests at target websites — are increasing in power and severity while also
growing in overall numbers. 



Following the announcement, the website for the country’s Centre for Cyber
Security was knocked offline, and an alert explaining the decision was also
unavailable. 

Since Russia began its invasion of Ukraine 11 months ago, hacking groups like
Killnet and NoName057 have targeted an array of government institutions,
businesses and organizations across Europe and the United States. 

On Monday, Killnet directed DDoS traffic against the websites of dozens of U.S.
hospitals, forcing the the U.S. Department of Health and Human Services to
publish an alert warning healthcare institutions about the group’s tactics. 

“It is likely that pro-Russian ransomware groups or operators, such as those
from the defunct Conti group, will heed Killnet’s call and provide support. This
likely will result in entities Killnet targeted also being hit with ransomware
or DDoS attacks as a means of extortion, a tactic several ransomware groups have
used,” HHS warned. 

Swimlane’s Daniel Selig noted that the DDoS incidents took place days after U.S.
President Joe Biden announced that the U.S. would be sending 31 Abrams tanks to
Ukrainian forces. 

Selig added that last week, several financial organizations, airports and
government offices in Germany were targeted in a similar way after their
announcement of additional military support for Ukraine. 

“It goes without saying that cyberattacks on hospitals and medical centers are
some of the most dangerous — these attacks have the ability to knock systems
offline in their entirety and keep patients from receiving the care that they
require,” he said.

While DDoS attacks typically do not cause major or lasting damage, they can
cause service outages that span several hours or even days.

Akamai published a report on Tuesday that found DDoS incidents in Europe
increased 73% in 2022, with more campaigns now involving extortion tactics. They
warned that DDoS attacks are now increasingly being used as cover for actual
intrusions involving ransomware and data theft. 

Aleksandr Yampolskiy, CEO of SecurityScorecard, noted that groups like Killnet
run popular channels on the Telegram app where they recruit new members and
teach other hackers DDoS skills. Killnet’s channel has more than 92,000
subscribers.

Groups like Killnet are able to muster so much DDoS traffic in part because they
exploit vulnerable devices online. Yampolskiy said Killnet typically target
routers from MikroTek that are either misconfigured or vulnerable, and the group
also takes advantage of the proliferation of IoT devices across the
world. Everything from internet-connected baby cameras to smart refrigerators
can be a potential target.

In December, the Justice Department announced the seizure of 48 domains used by
the leading DDoS-for-hire services — websites that allow users to pay hackers to
flood targets with page requests. But HHS said it is unclear if “this law
enforcement action might impact Killnet which turned its DDoS-for-hire service
into a hacktivist operation earlier this year.”

 * 
 * 
 * 
 * 
 * 

Tags
 * DDoS
 * DDoS attack
 * Denmark
 * Europe
 * Russia
 * Ukraine

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has
worked across the globe as a journalist since 2014. Before moving back to New
York City, he worked for news outlets in South Africa, Jordan and Cambodia. He
previously covered cybersecurity at ZDNet and TechRepublic.

Previous article Next article
Report: Developers are most in demand on dark web
LockBit takes credit for November ransomware attack on Sacramento PBS station


BRIEFS

 * CISA adds Oracle, SugarCRM bugs to exploited vulnerabilities list February 3,
   2023
 * Zero day affecting Fortra’s GoAnywhere file transfer tool is actively being
   exploited February 3, 2023
 * New York attorney general fines developer of stalking apps February 3, 2023
 * Tallahassee hospital diverting patients, canceling non-emergency surgeries
   after cyberattack February 3, 2023
 * Julius ‘zeekill’ Kivimäki, former Lizard Squad hacker, arrested in France
   February 3, 2023
 * Russia-linked hacking against national labs spurs inquiry from two House
   chairmen February 3, 2023
 * Switzerland’s largest university confirms ‘serious cyberattack’ February 3,
   2023
 * Feds get guilty plea in Ubiquiti data extortion case February 2, 2023


RANSOMWARE TRACKER: THE LATEST FIGURES [JANUARY 2023]



Ransomware tracker: the latest figures [January 2023]






2022 ADVERSARY INFRASTRUCTURE REPORT



2022 Adversary Infrastructure Report












SEASON OF GIVING, SEASON OF TAKING: HEIGHTENED FRAUD DURING HOLIDAY SHOPPING



Season of Giving, Season of Taking: Heightened Fraud During Holiday Shopping












H1 2022: MALWARE AND VULNERABILITY TRENDS REPORT



H1 2022: Malware and Vulnerability Trends Report








RUSSIAN INFORMATION OPERATIONS AIM TO DIVIDE THE WESTERN COALITION ON UKRAINE



Insikt Group: Russian Information Operations








VULNERABILITY SPOTLIGHT: DIRTY PIPE



Insikt Group: Dirty Pipe








GLOSSARY

Threat Intelligence

Threat Intelligence Feeds

Threat Intelligence Platform

Payment Fraud Intelligence

 * 
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News