Pro-Russian hackers hit Japan with DDoS attacks over military ties to the US
Date:
Sun, 01 Dec 2024 21:19:00 +0000
Description:
Coordinated DDoS attacks by pro-Russian groups disrupt Japanese logistics and manufacturing sectors.
FULL STORY
Pro-Russian threat actors have launched a series of coordinated DDoS attacks against Japanese organizations following Japans recent moves to strengthen
its military alliance with the United States.
Distributed Denial of Service ( DDoS ) attacks, which flood networks with traffic and disrupt operations, have become a go-to method for cybercriminals and hacktivist groups.
The attacks, which began in mid-October 2024, have targeted key sectors of Japan's economy and government, including logistics and manufacturing, as
well as political entities.
Tensions between Japan and Russia escalate
The cyberattacks followed recent statements made by Russias Ministry of
Foreign Affairs (MID), which expressed concern over Japan's growing militarization. Russia highlighted Japan's increased defense budget and its involvement in joint military exercises with the United States as causes for alarm.
Additionally, Japan's development of pre-emptive strike capabilities and participation in ballistic missile defense research have contributed to
rising tensions between the two nations.
On October 11, 2024, three days before the attacks, Russia reiterated its concerns. In response, two pro-Russian hacktivist groups, NoName057 and the Russian Cyber Army Team, launched a coordinated DDoS campaign aimed at disrupting Japanese organizations and infrastructure.
The cyberattack primarily focused on Japan's logistics and manufacturing sectors, with a particular emphasis on harbours and shipbuilding. This focus
on infrastructure is consistent with previous campaigns carried out by NoName057, a group known for targeting critical sectors in geopolitical conflict zones.
In addition to industrial targets, the hacktivists also attacked Japanese governmental and political organizations. Notably, the political party of Japans newly elected prime minister was one of the high-profile targets, potentially as an attempt by the attackers to draw attention to their
actions.
According to NETSCOUT , the attacks employed multiple direct-path DDoS attack vectors, with many originating from well-known nuisance networks, cloud
hosting provider infrastructure, and virtual private networks ( VPNs ). The attackers also utilized the DDoSia botnet to amplify their attacks, thereby employing different configurations to maximize the impact.
While these attacks were disruptive, NETSCOUT notes that they have not significantly altered the overall threat landscape in Japan.
======================================================================
Link to news story:
https://www.techradar.com/pro/Pro-Russian-hackers-subjected-Japan-to-DDoS-atta cks-over-military-ties-with-the-US
$$
--- SBBSecho 3.20-Linux
* Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)