Switzerland hit by relentless NoName DDoS assault

January 19, 2024
1 min read

TLDR:

  • Switzerland experienced distributed denial-of-service (DDoS) attacks on several government websites
  • The attacks were carried out by the pro-Russian hacktivist group NoName

Switzerland was targeted by a series of distributed denial-of-service (DDoS) attacks on its government websites, according to a report by Security Affairs. The attacks were reportedly carried out by the pro-Russian hacktivist group NoName, in response to the attendance of Ukrainian President Vladimir Zelensky at the World Economic Forum in Davos. While the primary government portal was not affected, the websites of the Swiss Ministry of the Interior, the Swiss cable car network’s POOL-ALPIN service provider, the Rhaetian railway to Davos, and the Davos-Klosters ski resort were compromised. The country’s National Cyber Security Centre has been working to restore the impacted sites.

This is not the first time that Switzerland has been targeted by DDoS attacks from the NoName hacktivist group. In June, several government, municipality, airport, and association websites in Switzerland were compromised in a similar fashion. It is unclear what the motivation behind these attacks is, but it appears that they are aimed at disrupting the country’s online infrastructure and causing inconvenience to its residents and visitors.

DDoS attacks have become a common tool for hacktivist groups to voice their grievances or enact revenge against a specific target. These attacks overload a website’s servers with a flood of traffic, rendering the site inaccessible to legitimate users. While they may not directly result in a data breach or theft of sensitive information, they can disrupt business operations and cause significant financial losses. Organizations must implement robust cybersecurity measures, such as traffic filtering and intrusion detection systems, to mitigate the impact of DDoS attacks.

The NoName hacktivist group, believed to have ties to Russia, has been active in targeting various countries and organizations. Its motivations and objectives remain somewhat elusive, but it is clear that they have the capability to launch disruptive cyber attacks. Governments and businesses must remain vigilant and prepared to defend against such threats. Cybersecurity teams should continually monitor their networks for any signs of unusual activity and promptly respond to any potential attacks. Additionally, international cooperation is essential in addressing these cyber threats, as they transcend national boundaries and require coordinated efforts to combat effectively.

Latest from Blog

Bridging the cyber talent gap: tips for CISOs

TLDR: – Global cyber threats have increased twofold in recent years, leading to a talent gap of nearly 4 million cyber professionals worldwide. – Existing cyber staff are under strain, with vacancies

North Korean hackers pivot to ransomware attacks

TLDR: North Korean hackers from APT45 have shifted from cyber espionage to ransomware attacks APT45 has targeted critical infrastructure and is linked to ransomware families SHATTEREDGLASS and Maui A North Korea-linked threat

Cyber insurance evolves to cover all your online needs

TLDR: Cyber insurance coverage is evolving to help raise security baselines across businesses. Only one-quarter of companies have a standalone cyber insurance policy. In today’s evolving cybersecurity landscape, cyber insurance coverage is