hacking group Killnet, which had disclosed its pro-Russian stance from the beginning, announced that it had bombed an American airport. And then they began to call in those who would attack America like themselves. However, the actual airports operated as usual. The website was down for a brief moment, and there was no damage to be done. There is an evaluation that Killnet is an organization that is good at media play.

The pro-Russian hacking group Killnet has attacked websites operated by major US airports. A DDoS attack was launched and websites were not functioning for a while. Killnet is also urging other groups of attackers to follow their progress. As tensions between Russia and Ukraine escalate, pro-Russian hackers seem to have begun to move more actively.

Airports affected by the Kilnet DDoS attack include Los Angeles International Airport (LAX), Chicago O’Hare International Airport, Hartsfield-Jackson International Airport, and Indianapolis International Airport. Depending on the airport, the website was mostly unavailable for several hours. However, it does not appear to have had any effect on the operation of the airport itself. Security firm Mandiant is tracking the attack, and a total of 15 US airport websites have reported similar findings.

Hello for a moment

, in the case of LA International Airport, in an official statement, it admitted that “there was a DDoS attack on the FlyLAX.com website from early in the morning.” “However, the airport operation itself continued as usual, with only some services provided through the website suspended. Also, the website, which was temporarily down, was quickly restored by our internal IT team, and we are investigating the case with the FBI.”

“Killnet is distributing a list of domains to attack via its Telegram channel,” said Ivan Righi, a cyber threat analyst at security firm Digital Shadows. will,” he warned. This list includes 49 domains related to airports. Airports in California, Delaware, Florida, Georgia, Illinois, Maryland, Massachusetts and Michigan are expected to be the next targets.

“It’s still difficult to assess exactly how successful or unsuccessful this attack was, but the killnets were the ones who originally did nothing but take the website offline for a while.” Reich’s explanation. “Killnet also continues to inform pro-Russian hackers that America’s infrastructure is vulnerable. After the current flow of attacking the airport passes once, there may be attacks targeting other facilities in the future.” All of the airport websites that were attacked have now been restored.

While gathering colleagues,

Vlad Cuiujuclu, global intelligence team leader at security firm Flashpoint, said, “The attack focused on airports began shortly after the announcement of a DDoS attack targeting the domains of U.S. private facilities.” . “Moreover, Killnet continues to urge them to help them attack America. We’re gathering people together to paralyze ports, logistics facilities, weather centers, medical companies, ticketing systems, exchanges, and online exchanges.”

These messages from Killnet are also spreading on Russian-based hacking forums. Major Russian-speaking hacking groups are also sharing the message, Kyuuyuklu points out. “Anonymous | Russia, Phoenix, We Are Clowns, etc. have received these messages and are spreading them. We don’t know yet if he actually started acting.”

There are many pro-Russian hackers in the world. But the most active is the killnet. Last week alone, Killnet paralyzed government websites in Mississippi, Kentucky and Colorado in a DDoS attack. In July, he claimed to have carried out a DDoS attack on the website of the US Congress, and in August he also announced that he had attacked Lockheed Martin, a missile manufacturer serving Ukraine. However, in the case of Lockheed Martin, there was no evidence or evidence that the Killnet was infringed. Flashpoint pointed out that “Killnet is somewhat lacking in providing evidence to support their claims.”

Killnets, which are too

, Russian, have claimed to have repeatedly attacked ‘enemies’ as soon as Russia invaded Ukraine illegally. Almost all claims of DDoS attacks on NATO members and several other countries supporting Ukraine. Flashpoint has previously described Killnets as a kind of press play group. “There is a strong tendency to exaggerate their aggression than they really are. The actual action itself doesn’t seem to be that great compared to the bold ambition, and the amount of damage is actually small.” Flashpoint’s description.

The killnet by itself is not yet a huge threat. However, in the sense that Russia’s war is a hybrid warfare, and it is making a long-standing prediction of security experts that the target of cyber attacks is not only Ukraine, the killnet is symbolic enough. Rather than the actual damage they inflicted, it is possible to estimate to what extent the tensions of the war have escalated by looking at their activity. Recently, as Russia hastily annexed Ukraine’s territory and appeared on the battlefield carrying nuclear weapons, the US and NATO are also raising the level of sanctions and criticism, and Killnet is also significantly increasing its activity.

“Another thing to remember is that while cyberattacks in the United States and other Western countries may have been negligible, Ukraine is not. It is true that Russia’s ability to conduct cyber warfare is one of the best in the world, and Ukraine is currently under the same tremendous attack. Ukrainian cyberspace is being shredded by Russian hacking attacks. It should be kept in mind that the tip of the sword may be aimed at other Ukrainian allies.” This is the explanation of Kyuuyuklu.

One thought on “Russian-backed hacking group paralyzes 15 US airport websites”

Leave a Reply

Your email address will not be published. Required fields are marked *