View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
November 24, 2022

European Parliament website hit by DDoS cyberattack from Russia’s Killnet

The parliament's website was down for seven hours after pro-Kremlin hackers launched a successful attack.

By Claudia Glover

The European Parliament website was shut down for seven hours yesterday after a DDoS attack executed by Russian cybercrime gang Killnet. The attack followed the parliament declaring Russia a “state sponsor of terrorism.” Killnet has implemented similar cyberattacks on government websites of numerous other supporters of Ukraine since the Russian invasion earlier this year.

European Parliament hit by DDoS attack
European Parliament saw its network knocked offline yesterday after sustaining a DDoS attack. (Photo by Drop of Light/Shutterstock)

The European Parliament network was knocked offline following its formal declaration classifying Russia as a sponsor of state terrorism. “Following the atrocities carried out by Vladimir Putin’s regime against Ukrainian civilians, MEPs have recognised Russia as a state sponsor of terrorism,” a statement released yesterday says.

European Parliament hit by DDoS attack

Hours after the declaration, the European Parliament went offline, with Killnet soon claiming responsibility via a post on Telegram.

Many members of the European Parliament were tweeting their distress at the apparent revenge for Russia’s terrorist sponsor classification. President of the European Parliament, Roberta Metsola tweeted, “The European Parliament is under a sophisticated cyberattack.”

German MEP Alexandra Geese also tweeted: “This morning Russia was designated as a terrorist state in an official resolution. This afternoon the entire network collapses in the European Parliament.”

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

While the attack was successful, sources familiar with the situation are doubtful that it was particularly sophisticated. DDoS kits are easily available online and can be implemented by most with any rudimentary IT knowledge.

Killnet has attacked numerous allies of Ukraine

Killnet has attacked numerous other government networks of countries that publicly support Ukraine. “Killnet’s aim is to make Europeans pay for their unequivocal support of Ukraine and punish Western governments for their anti-Russian sentiment,” Stefan Soesanto, a researcher at the Centre for Security Studies at ETH Zurich, told Politico.

Countries previously hit by the group include Lithuania, which has been subjected to a string of attacks, and Japan.

The gang attacked websites belonging to Italy’s Ministry of Defence, Senate and National Health Institute in May of this year. German public sector sites were also targeted by the gang. Websites for its Ministry of Defence, Bundestag, Federal Police and several state police authorities were knocked offline in March. Killnet later claimed responsibility.

Earlier this week, the gang claimed to have attacked several UK websites by implementing DDoS attacks on the official website for the Prince of Wales, the London Stock Exchange and the British Army website, which briefly had a “planned maintenance” notice on its site on Tuesday.  This attack has not been confirmed.

Read more: Shathak hacking gang targets healthcare and manufacturing

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU