DDoS Attacks In Poland Have Spiked As New Government Takes Office

Changes in political leadership often causes disruptions in many areas, including cyberspace, where Distributed Denial of Service (DDOS) attacks often increase when there is a change of government. These spikes often result from hacktivist and other groups opposing the viewpoints of newly elected officials. 

Now, Poland has become the target of several threat groups after new Prime Minister Donal Tusk was sworn in to office following a hotly contested election.

The most notable group targeting Poland is NoName057, who have targeted several types of websites, including government administration, transportation and logistics, finance, judicial government, manufacturing, air transport the  and media. 

No Name are a prolific pro-Russian hacktivist group which has developed tools readily available to like-minded threat actors. 

Analysts at business intelligence and cybersecurity firm NetSCout who have been tracking tracking DDoS attack trends against Poland have detected spikes in attacks beginning just days following the election of  Prime Minister Tusk's newly formed administration.  The attack volume began to increase after Christmas and have remained at a high level, spiking on January 14th with more than 5,000 total attacks.

This spike in attacks, fuelled by the new government’s support of Ukraine in fending off Russian military aggression has, resulted in an increase in DDoS attack volume by a factor of four.

NoName057 typically uses botnets running their DDoSia code to power their attacks. Upon diving into Poland’s DDoS attack traffic, it was discovered that nearly half of the attacks against the nation were sourced from nodes that are classified as DDoS bots. This massive influx represents 15-20% of the global botnet DDoS attacks currently focus on Poland.

It seems likely that groups like NoName057 will continue to wage a political war against any nation that it disapproves of. That means that governments, service providers, and enterprises should be prepared for these attacks to continue and grow. 

Image: Nina Hill

You Might Also Read: 

Russian Hackers Hit Italian Banks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Imran Khan Claims Victory Using AI Generated Video
Chinese Hackers Operated Undetected In Critical US Networks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

TUV Sud

TUV Sud

TÜV SÜD is one of the world's leading technical service organisations. Services offered include industrial cyber security.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

StrataCore

StrataCore

StrataCore is a single-source technology lifecycle advocate that works behind IT teams as a strategic partner to help them achieve peak enterprise outcomes.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.