DDoS Attacks In Poland Have Spiked As New Government Takes Office

Changes in political leadership often causes disruptions in many areas, including cyberspace, where Distributed Denial of Service (DDOS) attacks often increase when there is a change of government. These spikes often result from hacktivist and other groups opposing the viewpoints of newly elected officials. 

Now, Poland has become the target of several threat groups after new Prime Minister Donal Tusk was sworn in to office following a hotly contested election.

The most notable group targeting Poland is NoName057, who have targeted several types of websites, including government administration, transportation and logistics, finance, judicial government, manufacturing, air transport the  and media. 

No Name are a prolific pro-Russian hacktivist group which has developed tools readily available to like-minded threat actors. 

Analysts at business intelligence and cybersecurity firm NetSCout who have been tracking tracking DDoS attack trends against Poland have detected spikes in attacks beginning just days following the election of  Prime Minister Tusk's newly formed administration.  The attack volume began to increase after Christmas and have remained at a high level, spiking on January 14th with more than 5,000 total attacks.

This spike in attacks, fuelled by the new government’s support of Ukraine in fending off Russian military aggression has, resulted in an increase in DDoS attack volume by a factor of four.

NoName057 typically uses botnets running their DDoSia code to power their attacks. Upon diving into Poland’s DDoS attack traffic, it was discovered that nearly half of the attacks against the nation were sourced from nodes that are classified as DDoS bots. This massive influx represents 15-20% of the global botnet DDoS attacks currently focus on Poland.

It seems likely that groups like NoName057 will continue to wage a political war against any nation that it disapproves of. That means that governments, service providers, and enterprises should be prepared for these attacks to continue and grow. 

Image: Nina Hill

You Might Also Read: 

Russian Hackers Hit Italian Banks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Imran Khan Claims Victory Using AI Generated Video
Chinese Hackers Operated Undetected In Critical US Networks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

HEAL Security

HEAL Security

HEAL Security is the global authority for cybersecurity data, research and insights across the healthcare sector.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.