DDoS Attacks In Poland Have Spiked As New Government Takes Office

Changes in political leadership often causes disruptions in many areas, including cyberspace, where Distributed Denial of Service (DDOS) attacks often increase when there is a change of government. These spikes often result from hacktivist and other groups opposing the viewpoints of newly elected officials. 

Now, Poland has become the target of several threat groups after new Prime Minister Donal Tusk was sworn in to office following a hotly contested election.

The most notable group targeting Poland is NoName057, who have targeted several types of websites, including government administration, transportation and logistics, finance, judicial government, manufacturing, air transport the  and media. 

No Name are a prolific pro-Russian hacktivist group which has developed tools readily available to like-minded threat actors. 

Analysts at business intelligence and cybersecurity firm NetSCout who have been tracking tracking DDoS attack trends against Poland have detected spikes in attacks beginning just days following the election of  Prime Minister Tusk's newly formed administration.  The attack volume began to increase after Christmas and have remained at a high level, spiking on January 14th with more than 5,000 total attacks.

This spike in attacks, fuelled by the new government’s support of Ukraine in fending off Russian military aggression has, resulted in an increase in DDoS attack volume by a factor of four.

NoName057 typically uses botnets running their DDoSia code to power their attacks. Upon diving into Poland’s DDoS attack traffic, it was discovered that nearly half of the attacks against the nation were sourced from nodes that are classified as DDoS bots. This massive influx represents 15-20% of the global botnet DDoS attacks currently focus on Poland.

It seems likely that groups like NoName057 will continue to wage a political war against any nation that it disapproves of. That means that governments, service providers, and enterprises should be prepared for these attacks to continue and grow. 

Image: Nina Hill

You Might Also Read: 

Russian Hackers Hit Italian Banks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Imran Khan Claims Victory Using AI Generated Video
Chinese Hackers Operated Undetected In Critical US Networks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.