Maritime Computer Emergency Response Team ADMIRAL dataset ADMIRAL dataset

Publicly disclosed information for this event

Index Number:
Title:
2023_100
The website of a port is victim of a denial of service attack claimed by a hacktivist group [...]
Day Month Year Country Activity Incident Type
11 August 2023 Germany Port Denial of Service

Summary

According to sources, the victim port was targeted by the pro-Russian "hacker" group NoName057(16) during a Distributed Denial of Service attacks campaing. These cyber adversaries have expressed concerns over the nation's involvement in the ongoing conflict between Ukraine and Russia, following new support announcements in favor of Ukraine. Other German infrastructures were targeted during the same attack.

The attack resulted in short service disruptions.

Victim

Port of Bremen

Claimed/Reported Threat Actor

NoName057(16)

Origin

Hacktivism

Main impact

Availability

References

Recommendations to Port to reduce Denial of Service risks:

  • Implement rate limiting and traffic filtering to mitigate the impact of incoming malicious traffic.
  • Check with your IT service provider that the resilience of its systems against such attack was tested.
  • Regularly monitor network traffic and set up alerting for unusual patterns or spikes.
  • Diversify your server locations and use fail-over systems to ensure service availability in case of an attack.
  • Establish an incident response plan to quickly mitigate and recover from DoS attacks.
Previous Next
Disclaimer: the data are provided as is. France Cyber Maritime and the M-CERT take no responsibility for the soundness, quality, precision, nor the eventual attribution made by the referenced URLs. We give a lot of respect and support to the victims of attacks.
Files generated on Monday, 11th December 2023.
ADMIRAL is licensed under the Creative Commons CC-BY-NC license. Copyright © France Cyber Maritime 2023.