
The European Parliamentās website was briefly hit by a cyber attack claimed by pro-Russian hackers, officials said on Wednesday.
The website went down shortly after EU lawmakers declared Russia a āstate sponsor of terrorismā over its attacks on Ukraine.
āMEPs highlight that the deliberate attacks and atrocities committed by Russian forces and their proxies against civilians in Ukraine, the destruction of civilian infrastructure and other serious violations of international and humanitarian law amount to acts of terror and constitute war crimes,ā a press release from the EU Parliament stated.
āThe European Parliament is under a sophisticated cyberattack. A pro-Kremlin group has claimed responsibility,ā the Parliamentās president, Roberta Metsola, posted on Twitter.
The @Europarl_EN is under a sophisticated cyberattack. A pro-Kremlin group has claimed responsibility.
Our IT experts are pushing back against it & protecting our systems.
This, after we proclaimed Russia as a State-sponsor of terrorism.
My response: #SlavaUkraini
ā Roberta Metsola (@EP_President) November 23, 2022
Spokesman Jaume Duch said the website had been targeted by a distributed denial-of- service (DDoS) attack.
?The availability of @Europarl_EN website is currently impacted from outside due to high levels of external network traffic.
This traffic is related to a DDOS attack (Distributed Denial of Service) event.
EP teams are working to resolve this issue as quickly as possible.ā Jaume Duch (@jduch) November 23, 2022
Such attacks disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
They have also emerged as the preferred tool of Russian hacking groups like Killnet, as a way to cause chaos and protest against European countries that support Ukraine in the war.
āAs geopolitical tensions rumble on, cyberattacks are increasingly viewed as a viable tool in the armory of nation states,ā Oliver Pinson-Roxburgh, CEO of cybersecurity company Defense.com, told TNW.
āThe attack on the European Parliament looks to have been timed specifically, hitting their systems at a moment of maximum demand that would be guaranteed to command the greatest attention from the watching world,ā he added.
While MEP Rasmus Andresen noted that itās not certain yet if the attack was directly linked to the resolution on Russia, he did highlight that the parliamentās systems were ānot sufficiently prepared,ā AFP reports.
āI hope that todayās events will lead us to better protect our data and our democracies because it certainly wonāt be the last time we are victims of such attacks,ā he stated.
In fact, cyber attacks against EU institutions have been gradually increasing since 2018, raising concerns about the public sectorās cyber vulnerabilities and defences.
āThe lesson from this attack on the European Parliament should be taken up by all government and public sector organizations: prioritize improving cyber defences to avoid any disruption in the delivery of vital services to citizens,ā Pinson-Roxburgh remarked.
āThe failure of public sector organizations to protect services from bad actors will only further undermine public trust in institutions. Public sector organizations must plan for the long term, improving threat management systems and putting in place up-to-date education and awareness training for all staff.ā
Get the TNW newsletter
Get the most important tech news in your inbox each week.