Cyber Attack Hits German Air Traffic Control

The German air traffic control agency, Deutsche Flugsicherung (DFS), has confirmed that it was hit by a cyber attack disrupting its office communications. The recent attack affected the company’s IT infrastructure but has not impact air traffic control operations and flights were unaffected.

This cyber attack was probably done by APT28, also known as Fancy Bear, a notorious hacker group closely linked to the Russian military intelligence service GRU.

APT28 has been cyber hacking government agencies, political organisations, and media outlets across Europe and North America since 2004. The group has a history of attacks on critical infrastructure. But in Germany, APT28 is known for a cyber attack against the Bundestag in 2015.

A DFS spokesperson confirmed that the attack happened and has said that they are implementing defensive measures. The nature of the attack remains unclear, and it is not yet known whether any sensitive data was compromised.

The Federal Office for the Protection of the Constitution (BfV) has been notified, and the incident is under investigation.

The BfV, which has monitored APT28’s activities for years, emphasises the group’s ties to the GRU, suggesting that the attack may have geopolitical motivations beyond mere criminal intent. Authorities have not said anything about the ongoing investigation, with the Federal Ministry of Transport overseeing DFS, referring inquiries back to the agency itself.

The involvement of APT28, if confirmed, would underscore the geo-political dimensions of the attack

APT28 has been implicated in a lot of cyber attacks with politically motivated goals, and its links to the Russian GRU suggest that such incidents may be part of broader efforts to influence international affairs and promote political instability.

The Record     |     TEISS     |     BR24     |     Commercial Risk     |     Pravda     |     Euro Integration

Image: Pixabay

You Might Also Read: 

Russia’s Cyber Strategy:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Campaign Targets WhatsApp Users
How AI Will Help Disrupt Elections Around The Globe »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.