First design
Site Theme
The European Parliament’s online page went offline for several hours on Wednesday via a distributed denial-of-service (DDoS) attack that began some time after the ruling framework voted to claim the Russian government is a state sponsor of terrorism.
European Parliament President Roberta Metsola showed the attack Wednesday afternoon European time while the site was not yet available. “A pro-Kremlin organization has claimed responsibility,” he wrote on Twitter. “Our IT experts oppose and protect our systems. This, after we proclaimed Russia a state sponsor of terrorism.
As this message was being flagged and typed, the online page was available and seemed to function normally.
Pro-Russian risk Killnet hits Lithuania with DDoS attacks from countries. Targets included police, airports and governments in Lithuania, Germany, Italy, Romania, Norway and the United States.
Shortly after Wednesday’s attack on the European Parliament began, Killnet members turned to a personal channel on Telegram to post screenshots that appeared the European Parliament’s online page was unavailable in 23 countries. The text that accompanied the photographs made a homophobia directed at the legislature.
The blackout came shortly after parliament voted overwhelmingly to affirm that the Kremlin is a sponsor of terrorism.
Members of the European Parliament “stress that planned attacks and atrocities committed through Russian forces and their proxies against civilians in Ukraine, destruction of civilian infrastructure and other serious violations of foreign and humanitarian law constitute acts of terror and constitute war crimes. “. what I said. ” In light of this, they recognize Russia as a state sponsor of terrorism and as a state that ‘uses means of terrorism. ‘”
The solution followed with 494 votes in favor and 58 against. There were 44 abstentions.
DDoS attacks exploit the bandwidth of hundreds, thousands, and in some cases, millions of computers infected with malware. Once under their control, attackers trick them into bombing a target site with more traffic than they can handle, forcing them to deny service to valid. Users. Traditionally, DDoS has been one of the crudest attack bureaucracies because it relies on brute force to silence its targets.
Further reading New approach that amplifies DDoS four billion times. What can go wrong? Over the years, DDoS has advanced further. In some cases, attackers can multiply bandwidth by a thousand employing amplification approaches, which send information to a misconfigured third-party site, which then sends a much larger amount of traffic back to the target.
Further readingRecord DDoS helps keep coming, with no end in sight. Another innovation has been the design of attacks that exhaust the computing resources of a server. Second Sfinish attacks express computationally extensive types of requests to a target for the purpose of shutting down hardware connected to the pipeline.
Metsola said DDoS attacks opposed to the European Parliament were “sophisticated,” a word misused to describe DDoS and hacks. It did not provide any main points to substantiate this assessment.
Join the Ars Orbital Transmission email to get weekly updates to your inbox.