Greece And Turkey In Conflict

Turkish hackers from  a group calling itself Anka Neferler have recently claimed responsibility for cyberattacks on Greek government sites in claimed retaliation to the Greek government’s stance on a recent Turkish agreement with Libya. 

Greek officials confirmed that the Turkish attacks had taken place and said that measures would be taken to prevent similar ones in the future. The attacks  have included the Greek National Intelligence Services (EYP), Greek Parliament, the Greek Ministry of Foreign Affairs and the Ministry of Finance.

Within 12 hours of these attacks a Greek group, known as Anonymous Greece, retaliated with cyberattacks on a number of Turkish websites. “As the Turks hit yesterday, so did we the day after in response. Let it be known that the attacks have just begun. For every new attack, we will be posting a new article,” the group wrote on their website.

Sources in the Greek government said that the attacks used Denial of Service (DOS) as a means to disrupt normal Internet operations. The flood of network traffic was detected by government authorities who disconnected servers before additional damage could occur. Attackers were unable to steal data or post messages, however the Greek Parliament website was overloaded and went offline.

The investigation into the hacks is ongoing, and despite the Turkish group’s claims to be behind the hacks there has been no data to indicate their involvement so far. Following the cyberattack on Greek government websites, many key websites such as the Ministry of Foreign Affairs are still ‘down’ leading to major headaches for both citizens and the government.

According to reports, all Greek embassies and diplomatic missions such as Consulates, will be faced with a major communication problem as a consequence of the server of the Ministry of Foreign Affairs being offline. 

All communication such as that between Consulates and Embassies with the outside world will be impossible, leading to a major operational issues. 

NeosKosmos:        Greek City Times:        CSHub:    EURActiv:

You Might Also Read: 

Turkey Using German Spy Software On Opposition Politicians & Activists:

Phineas Fisher Fingered: Hacking the Turkish Government:

 

« GDPR Data Breach Notifcations & Fines Are Increasing
Cyber Crime Costs Britain $27 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.