DDoS Attacks In Poland Have Spiked As New Government Takes Office

Changes in political leadership often causes disruptions in many areas, including cyberspace, where Distributed Denial of Service (DDOS) attacks often increase when there is a change of government. These spikes often result from hacktivist and other groups opposing the viewpoints of newly elected officials. 

Now, Poland has become the target of several threat groups after new Prime Minister Donal Tusk was sworn in to office following a hotly contested election.

The most notable group targeting Poland is NoName057, who have targeted several types of websites, including government administration, transportation and logistics, finance, judicial government, manufacturing, air transport the  and media. 

No Name are a prolific pro-Russian hacktivist group which has developed tools readily available to like-minded threat actors. 

Analysts at business intelligence and cybersecurity firm NetSCout who have been tracking tracking DDoS attack trends against Poland have detected spikes in attacks beginning just days following the election of  Prime Minister Tusk's newly formed administration.  The attack volume began to increase after Christmas and have remained at a high level, spiking on January 14th with more than 5,000 total attacks.

This spike in attacks, fuelled by the new government’s support of Ukraine in fending off Russian military aggression has, resulted in an increase in DDoS attack volume by a factor of four.

NoName057 typically uses botnets running their DDoSia code to power their attacks. Upon diving into Poland’s DDoS attack traffic, it was discovered that nearly half of the attacks against the nation were sourced from nodes that are classified as DDoS bots. This massive influx represents 15-20% of the global botnet DDoS attacks currently focus on Poland.

It seems likely that groups like NoName057 will continue to wage a political war against any nation that it disapproves of. That means that governments, service providers, and enterprises should be prepared for these attacks to continue and grow. 

Image: Nina Hill

You Might Also Read: 

Russian Hackers Hit Italian Banks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Imran Khan Claims Victory Using AI Generated Video
Chinese Hackers Operated Undetected In Critical US Networks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

National Cybersecurity Consortium (NCC) - Canada

National Cybersecurity Consortium (NCC) - Canada

The NCC’s mandate is to keep Canada’s cyber and critical infrastructures and citizens safe while ensuring Canada’s global competitiveness and leadership in cybersecurity.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.