Cyber Attack Hits German Air Traffic Control

The German air traffic control agency, Deutsche Flugsicherung (DFS), has confirmed that it was hit by a cyber attack disrupting its office communications. The recent attack affected the company’s IT infrastructure but has not impact air traffic control operations and flights were unaffected.

This cyber attack was probably done by APT28, also known as Fancy Bear, a notorious hacker group closely linked to the Russian military intelligence service GRU.

APT28 has been cyber hacking government agencies, political organisations, and media outlets across Europe and North America since 2004. The group has a history of attacks on critical infrastructure. But in Germany, APT28 is known for a cyber attack against the Bundestag in 2015.

A DFS spokesperson confirmed that the attack happened and has said that they are implementing defensive measures. The nature of the attack remains unclear, and it is not yet known whether any sensitive data was compromised.

The Federal Office for the Protection of the Constitution (BfV) has been notified, and the incident is under investigation.

The BfV, which has monitored APT28’s activities for years, emphasises the group’s ties to the GRU, suggesting that the attack may have geopolitical motivations beyond mere criminal intent. Authorities have not said anything about the ongoing investigation, with the Federal Ministry of Transport overseeing DFS, referring inquiries back to the agency itself.

The involvement of APT28, if confirmed, would underscore the geo-political dimensions of the attack

APT28 has been implicated in a lot of cyber attacks with politically motivated goals, and its links to the Russian GRU suggest that such incidents may be part of broader efforts to influence international affairs and promote political instability.

The Record     |     TEISS     |     BR24     |     Commercial Risk     |     Pravda     |     Euro Integration

Image: Pixabay

You Might Also Read: 

Russia’s Cyber Strategy:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Campaign Targets WhatsApp Users
How AI Will Help Disrupt Elections Around The Globe »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security understand the evolving threat landscape and provide businesses with comprehensive cybersecurity solutions.