Risk
3/17/2014
03:49 PM
Connect Directly
RSS
E-Mail
50%
50%

DDoS Attacks Hit NATO, Ukrainian Media Outlets

As pro-Russia hackers continue DDoS campaigns, Anonymous-branded propaganda reports "imminent US invasion of the Ukraine"

Multiple NATO and Ukrainian media websites were hit with distributed denial-of-service (DDoS) attacks over the weekend by a pro-Russia group calling itself Cyber Berkut (KiberBerkut). "DDoS attack on some #NATO sites ongoing but most services restored," NATO spokeswoman Oana Lungescu tweeted Sunday. "Integrity of NATO data & systems not affected. We continue working on it."

The DDoS attacks against NATO were launched after secretary general Anders Fogh Rasmussen -- a former prime minister of Denmark -- said Friday that NATO would not recognize the results of the planned "so-called referendum in Ukraine's Autonomous Republic of Crimea," on the grounds that it violated both the Ukrainian constitution and international law. "Holding this referendum would undermine international efforts to find a peaceful and political solution to the crisis in Ukraine," he said. "It would run counter to the principles of the United Nations Charter. It is vital that those principles be upheld."

But according to Cyber Berkut, the attacks were launched Saturday in response to a small delegation of NATO officials arriving in the Ukrainian capital of Kiev earlier this month. Cyber Berkut decried "the NATO occupation of our homeland" and also appeared to threaten citizens of NATO member countries. "If NATO cannot protect their resources, the protection of personal data of ordinary Europeans cannot be considered," the group said Sunday in a post to Pastebin.

Read the full article here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter. View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3345
Published: 2014-08-28
The web framework in Cisco Transport Gateway for Smart Call Home (aka TG-SCH or Transport Gateway Installation Software) 4.0 does not properly check authorization for administrative web pages, which allows remote attackers to modify the product via a crafted URL, aka Bug ID CSCuq31503.

CVE-2014-3347
Published: 2014-08-28
Cisco IOS 15.1(4)M2 on Cisco 1800 ISR devices, when the ISDN Basic Rate Interface is enabled, allows remote attackers to cause a denial of service (device hang) by leveraging knowledge of the ISDN phone number to trigger an interrupt timer collision during entropy collection, leading to an invalid s...

CVE-2014-4199
Published: 2014-08-28
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.

CVE-2014-4200
Published: 2014-08-28
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, uses 0644 permissions for the vm-support archive, which allows local users to obtain sensitive information by extracting files from this archive.

CVE-2014-0761
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows remote attackers to cause a denial of service (infinite loop or process crash) via a crafted TCP packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.