Hacktivism

Pro-Russian group Killnet claims responsibility for DDoS attack that has taken down the European Parliament site

Pro-Russian hacker collective Killnet took down the European Parliament website with a DDoS cyberattack.

The Pro-Russia group of hacktivists Killnet claimed responsibility for the DDoS attack that today took down the website of the European Parliament website.

“KILLNET officially recognises the European Parliament as sponsors of homosexualism,” states the group. 

The attack was launched immediately after lawmakers approved a resolution calling Moscow a “state sponsor of terrorism“.

“The European Parliament is under a sophisticated cyberattack. A pro-Kremlin group has claimed responsibility,” said parliament’s president, Roberta Metsola. “Our IT experts are pushing back against it and protecting our systems. This, after we proclaimed Russia as a State-sponsor of terrorism. My response: #SlavaUkraini (Glory to Ukraine).”

The Director General for Communication and Spokesperson of the European Parliament, Jaume Dauch, also confirmed the attack via Twitter.

European Pirate Party MEP Mikulas Peksa reported that “there are reports that the pro-Russian hacking group Killnet has claimed responsibility for the attack”. 

“If these reports are true, this is a massive attack on European democracy that will require further action,” he added. 

MEPs call for the further international isolation of Russia due to its aggression to Ukraine and the ongoing escalation of the attacks against civilians.

“Parliament calls on the European Union to further isolate Russia internationally, including when it comes to Russia’s membership of international organisations and bodies such as the United Nations Security Council. MEPs also want diplomatic ties with Russia to be reduced, EU contacts with official Russian representatives to be kept to the absolute minimum and Russian state-affiliated institutions in the EU spreading propaganda around the world to be closed and banned.” states the press release published by the EU Parliament. “Against the backdrop of the Kremlin’s escalating acts of terror against Ukrainian civilians, the resolution further calls on EU member states in the Council to swiftly complete its work on a ninth sanctions package against Moscow.”

In October, the pro-Russia hacktivist group ‘KillNetclaimed responsibility for massive distributed denial-of-service (DDoS) attacks against the websites of several major airports in the US. The DDoS attacks have taken the websites offline, users were not able to access them during the offensive.

KillNet has previously targeted many other countries that condemned the Russian invasion of Ukraine, including ItalyRomaniaEstoniaLithuania, and Norway.

Italian readers can read my comment to the Italian Press Agency ANSA.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, European Parliament)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

8 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

15 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

21 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

22 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.