Breaking

The European Parliament’s Website was hit by a Cyberattack claimed by Killnet

On November 23rd, the European Parliament was hit by a cyberattack that was orchestrated and claimed by a Pro-Kremlin Group called Killnet. The attack came after Europe declared Russia as “a state sponsor of terrorism”.

Dita Charnzova, Czech MEP and Parliament VP of Cybersecurity confirmed a DDOS attack on the Parliament’s website but ensured that the services are well-prepared to handle such incidents.

However, the DDOS attack that hit the parliament on Wednesday did take  it down for  brief amount of time.

The European Parliament’s Cyberattack and Killnet’s malicious intent

The Killnet, anonymous Russia and part of the pro-Russian hacktivist entity claimed the attack in a Telegram message stating that the European Parliament sponsors homosexualism. The Killnet cybercrime group usually backs Russia and have already struck Lithuania in the past, to intimidate European opposers of the Kremlin’s aggression in Ukraine.

Furthermore, in August Killnet already targeted Estonian Government Services, stating it to be the largest attack after 2008. Killnet have also been heavily involved in several Italian organizations stating that Italy was squashed like a mosquito after their attacks.

As per Politico, Belgium’s national cybersecurity center confirmed that there is an active investigation into the details of the attack. The coincidence is that the European Parliament ruled Russia to be a state sponsor of terrorism.

TheMEPs also stated that they want diplomatic relations with Russia to be reduced, EU contracts with Russian entities will be made minimum, with Russian state-affiliated organization based out of EU will be closed and permanently banned.

Yesterday, we just posted that 34 Russian Cybercrime Groups stole 50 million passwords across 111 countries with the USA on top of those victims loosing 91,000 passwords and now the EU Parliament Cyberattack comes next using a DDOS maneuver.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago