FBI Russian hacktivists achieve only ‘limited’ DDoS success

Share:

Pro-Russia hacktivists’ recent spate of network-flooding bot traffic aimed at US critical infrastructure targets, while annoying, have had “limited success,” according to the FBI.

Historically, hacktivists time their distributed denial of service (DDoS) attacks to coincide with high-profile real-world events. And true to form, network flooding has followed the Kremlin’s illegal invasion of neighboring Ukraine.

While the FBI alert doesn’t name said hacktivists in its latest cyber squad notification [PDF] for private industry, the Feds may be talking about Killnet, a “relatively unsophisticated” gang whose “nuisance-level DDoS attacks” don’t live up to its rhetoric, according to security researchers.

This is the group of pro-Kremlin miscreants that claimed responsibility for knocking more than a dozen US airports’ websites offline on October 10. However, the large-scale DDoS attack didn’t disrupt air travel or cause any operational harm to the airports.

A day later, the same criminals claimed they unleashed another bot army on JPMorgan Chase, but saw similarly feeble results.

And then last week, a US Treasury Department official said the agency thwarted a “pretty low-level” DDoS attack targeting the department’s critical infrastructure nodes, also attributed to Killnet.

In case the pattern hasn’t become clear, the FBI summarizes it thus:

These attacks are generally opportunistic in nature and, with DDoS mitigation steps, have minimal operational impact on victims; however, hacktivists will often publicize and exaggerate the severity of the attacks on social media. As a result, the psychological impact of DDoS attacks is often greater than the disruption of service.

The group may have had more success in Eastern Europe, claiming more than 200 victim websites in Estonia plus Lithuanian energy company Ignitis Group’s website and e-services as DDoS casualties.

These types of security events don’t require much technical know-how, and there’s a range of open-source DDoS tools that hacktivists can use to flood target organizations’ networks with junk traffic. Both of these things make DDoS attacks relatively easy — and, thus, attractive — for miscreants looking to pull off publicity stunts, but they’re seldom annoying with the right setup.

However, even if they don’t directly affect operations, DDoSes do hurt business by preventing legitimate customers from accessing a company’s website. So to help avoid these junk-traffic floods, the FBI suggests enrolling in a denial of service protection service that detects and redirects abnormal traffic flows.

Organizations should also partner with local ISPs prior to a DDoS event and create a disaster recovery plan to minimize downtime and ensure efficient communication and mitigation in the case of an attack, according to the FBI.

Kaspersky: ‘smart’ DDoS attacks on the rise

Before writing off DDoS attacks entirely as the unimpressive work of hacktivists, however, a third-quarter DDoS report by Kaspersky cited a “significant rise in smart attacks” globally — these are the more sophisticated security events conducted by professional criminals.

In Q3, the number of all types of DDoS attacks increased compared to previous reporting periods. While the overall number jumped 47.87 percent compared to Q3 2021, the number of smart DDoS attacks doubled, according to the security firm. It’s worth noting these include both pro-Russia and pro-Ukraine politically motivated attacks.

Additionally, the DDoS attacks on HTTPS for the first time this quarter exceeded those on TCP, despite the latter being easier to conduct and still the most common type of network floods.

While Q3 didn’t set any new records in terms of attack duration (that dubious honor goes to the previous three months, with the longest attack on record) on average attacks lasted about eight hours and the longest lasted nearly four days.

“Compared to the previous quarter, this seems rather modest, but the numbers are still huge: in Q3 of last year, the duration of DDoS attacks was measured in minutes, not hours,” according to the report. “In this regard, the situation remains challenging.” ®

https://www.theregister.com/2022/11/08/fbi_hacktivists_useless/

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
1:42 pm, Jul 8, 2025
weather icon 22°C
L: 21° | H: 23°
clear sky
Humidity: 40 %
Pressure: 1018 mb
Wind: 4 mph NNW
Wind Gust: 12 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 0%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:53 am
Sunset: 9:17 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
21° | 23°°C 0 mm 0% 7 mph 40 % 1019 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
16° | 26°°C 0.1 mm 10% 8 mph 59 % 1023 mb 0 mm/h
Thu Jul 10 10:00 pm
weather icon
18° | 30°°C 0 mm 0% 7 mph 75 % 1024 mb 0 mm/h
Fri Jul 11 10:00 pm
weather icon
19° | 29°°C 0 mm 0% 9 mph 68 % 1023 mb 0 mm/h
Sat Jul 12 10:00 pm
weather icon
18° | 28°°C 0 mm 0% 11 mph 71 % 1020 mb 0 mm/h
Today 4:00 pm
weather icon
23° | 24°°C 0 mm 0% 7 mph 37 % 1018 mb 0 mm/h
Today 7:00 pm
weather icon
24° | 24°°C 0 mm 0% 7 mph 32 % 1017 mb 0 mm/h
Today 10:00 pm
weather icon
19° | 19°°C 0 mm 0% 4 mph 40 % 1019 mb 0 mm/h
Tomorrow 1:00 am
weather icon
18° | 18°°C 0 mm 0% 5 mph 50 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
16° | 16°°C 0 mm 0% 4 mph 58 % 1020 mb 0 mm/h
Tomorrow 7:00 am
weather icon
16° | 16°°C 0 mm 0% 4 mph 51 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
21° | 21°°C 0 mm 0% 6 mph 59 % 1022 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
22° | 22°°C 0 mm 0% 8 mph 56 % 1022 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,756.06
0.24%
Ethereum(ETH)
€2,197.51
0.99%
Tether(USDT)
€0.85
0.01%
XRP(XRP)
€1.96
0.83%
Solana(SOL)
€129.39
-0.20%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.145915
0.79%
Shiba Inu(SHIB)
€0.000010
1.39%
Pepe(PEPE)
€0.000009
0.69%
Scroll to Top