Russian Hackers Shut Down US State Government Websites

A hacking attack group with connections to the Russian government has claimed credit for cyber attacks on the government websites of 3 US States.

The group, which calls itself Killnet, have temporarily disabled websites run by the governments of Colorado, Kentucky and Mississippi.

Images being shared on the group’s Telegram channel show a target list including sites run by dozens of US state governments.

The sites for Mississippi and Kentucky were functioning again the next day on Thursday 6th October, following the Russian cyber attacks, while the Colorado State Official Web Portal was displaying a message that the "homepage is currently offline," earlier in the day. By Thursday afternoon, the homepages were back online.

Reports of the attacks by the so-called Killnet hacktivist group is particularly alarming in light of upcoming November US mid-term elections, which rely on individual states to administer voting.

"In the case of these state government websites, the disruption of service, while inconvenient, is far less of a problem than a data breach involving the theft of personally identifiable information," Erich Kron, security awareness advocate with KnowBe4, said in an emailed statement in reaction to news of the cyber attack.

"Whether it's the defacement of websites, or taking them offline with attacks such as distributed denial-of-service (DDoS) attacks, it does erode public trust in the organisations that these websites represent."

The group’s also targeted US websites before, including that of Bradley International Airport in Hartford, Connecticut, as well as Congress.gov.

Killnet was also one of several groups included in a Five-Eyes alert earlier this year warning of Russian state-sponsored and criminal threats, including DDoS attacks against critical infrastructure.

Dark Reading:     CNN:    Statescoop:     CISA:   SiliconAngle:     NBC:    Flipboard

You Might Also Read: 

Killnet Turn Their Attention To Lockheed Martin:

 

« Former Uber Security Chief Convicted
Singtel’s Australian Subsidiary Dialog Breached »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.

Axiler

Axiler

Axiler’s AI-driven self-healing architecture seamlessly detect, patch, and neutralize threats in real-time, ensuring systems remain secure and ever-adaptable.