May 15, 2025
Trending News

VPN traffic and disguise: how the enemy attacks government sites in Ukraine

  • April 16, 2022
  • 0

In Ukraine, a number of large-scale DDOS attacks on government websites were recorded and repulsed. According to Ukrinform, the State Service for Special Communications and Information Protection of

VPN traffic and disguise: how the enemy attacks government sites in Ukraine

VPN traffic and disguise: how the enemy attacks government sites in Ukraine

In Ukraine, a number of large-scale DDOS attacks on government websites were recorded and repulsed.

According to Ukrinform, the State Service for Special Communications and Information Protection of Ukraine announced this on Facebook.

“The system of secure access to the Internet of the State Center for Cyber ​​Security of the State Special Communications Service (SCC) recorded and repelled a series of large-scale DDOS attacks aimed at disrupting the availability of Ukraine’s web resources. Authorities.”

DCC experts determined that the attacks were carried out from a large number of infected botnet hosts trying to disguise themselves as legitimate traffic from browsers to circumvent blocking rules.

A feature of the attack was the implementation of a bot attack with a blocked DDoS attack by simulating user behavior.

The attackers carried out a two-stage cyber operation.

In the first phase, a small amount of botnet traffic was generated to test the resources for vulnerabilities over several days. The second step was to generate a large amount of traffic in a short time to block access to web resources.

The peak power of the attacks exceeded 435 Gbps.

The attacks were carried out mostly with the help of VPN traffic masquerading as various countries, including Ukraine.

“However, such manipulations were detected by SCC experts and were blocked due to measures taken to further adjust security policies. The availability of resources was not violated, “the service stressed.

As Ukrinform reported, the State Special Communications Service warned of a new hacker attack on the topic of mobilization.

The government’s Computer Emergency Response Team CERT-UA, operating under the auspices of the State Special Communications Service, warns of the widespread distribution of dangerous XLS documents called “Mobilization Register.xls” among Ukrainian citizens. Opening the document will eventually launch the malicious IcedID program, also known as BankBot, on your computer. It belongs to the class of “Banking Trojans” and allows, among other things, theft of authentication data.

Source: Ukrinform

Leave a Reply

Your email address will not be published. Required fields are marked *