• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026

    CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    CVE-2026-21858

    New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

    Prosura cyberattack

    Australian Insurer Prosura Confirms Cyber Incident, Takes Online Services Offline Amid Investigation

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    telecommunication sector

    Telecommunications Sector Sees a Four-fold Jump in Ransomware Attacks in last 4 Years: Report

    TOTOLINK EX200 CVE-2025-65606

    Unpatched TOTOLINK EX200 Flaw Enables Root-Level Telnet Access, CERT/CC Warns

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026

    CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    CVE-2026-21858

    New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

    Prosura cyberattack

    Australian Insurer Prosura Confirms Cyber Incident, Takes Online Services Offline Amid Investigation

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    telecommunication sector

    Telecommunications Sector Sees a Four-fold Jump in Ransomware Attacks in last 4 Years: Report

    TOTOLINK EX200 CVE-2025-65606

    Unpatched TOTOLINK EX200 Flaw Enables Root-Level Telnet Access, CERT/CC Warns

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features Cyber Warfare

Cyber Attacks on Sweden Rises: #OpSweden is Back, This Time With Different Results

Unlike the results of the previous wave of #OpSweden cyber attack son Sweden spike that followed the Islamophobic incident in January, the drama has unfolded differently this time

Editorial by Editorial
July 6, 2023
in Cyber Warfare, Features, Firewall Daily
0
cyber attacks on Sweden
795
SHARES
4.4k
VIEWS
Share on LinkedInShare on Twitter

After a lull, #OpSweden began trending on Twitter last week as ATP-backed cyber attacks on Sweden swelled. The latest in the list of the so-called hacktivist groups to execute cyber attacks on Sweden is the GANOSEC TEAM.

cyber attacks on Sweden

This Indonesian hacker group has claimed responsibility for targeting the website of Kristianstad University in Sweden.

A few hours before this came to light, Team R70, comprised of Yemeni hackers, posted on Telegram that they have targeted Sweden’s prominent taxi service provider Taxipriser.

cyber attacks on Sweden

This latest attack comes as part of the group’s ongoing campaign against the Scandinavian nation.

It all started on June 28 when Swedish police issued a protest permit to an individual near the main mosque in central Stockholm, where the Qur’an burning incident took place.

The permit was granted following court appeals by the individual, who had previously been denied permission to burn the Qur’an outside Iraq’s embassy in the Swedish capital, reported Bloomberg.

report-ad-banner

It was the first such event since a similar incident in January strained negotiations between Sweden and Turkey regarding the Nordic country’s NATO membership.

The previous Danish-Swedish far-right extremist’s act sparked outrage in Muslim countries and led to Turkey’s refusal to support Sweden’s NATO bid.

Pro-Russian hacker group NoName057(16), popularly known as NoName, was among the first to respond, issuing a warning about cyber attack on Sweden.

cyber attacks on Sweden

“Swedish police allowed to burn the Koran in Stockholm on the first day of Eid al-Adha, we read in the news,” said the threat group’s Telegram post on June 28.

“Considering that the Swedish authorities also help Ukrainian terrorists, we could not pass by and killed the website of the financial supervision of Sweden.”

What followed was a spike in cyber attacks on Sweden; an avalanche of DDoS attacks on Swedish websites, claimed by seemingly disrelated cybercriminal gangs, some known, some newbies.

However, unlike the results of the previous Islamophobic incident and the cyber attacks on Sweden that followed, the drama has unfolded differently this time.

Act 1: Cyber attacks on Sweden and the repercussion

NoName took down the websites of the Swedish Ministry of Finance and railway carrier SJ AB on 28 June.

In the days that followed, several known and unknown hacker groups including AnonymousSudan, 1919 Team, Islamic Hacker Army, Host Kill Crew, US NEXUS HACKER, Mysterious Team Bangladesh, KEP TEAM, UserSec collective, Team Heroxr, Electronic Tigers Unit, Team R70, GANOSEC TEAM, and Türk Hack Team executed DDoS attacks on several Swedish websites.

Almost all of them posted threat notes on June 29 about their impending cyber attack on Sweden.

cyber attacks on Sweden

Websites that faced DDoS attacks in the days that followed included the Swedish Parliament, the Swedish National Data Service (SND), Uppsala University Hospital, and several other private organizations.

While cyber attacks on Sweden peaked on one side, diplomatic pressure from Muslim-majority countries mounted on Sweden, forcing the Swedish government to condemn the Islamophobic act.

The Organization of Islamic Cooperation (OIC), based in Saudi Arabia, called for collective measures to prevent future incidents of Qur’an burnings. The OIC, comprising 57 member states, convened at its Jeddah headquarters to address the incident.

The repercussions of the Qur’an burnings have extended beyond Sweden, as several countries, including Iraq, Kuwait, the United Arab Emirates, and Morocco, have summoned Swedish ambassadors in protest.

Although Swedish police granted the permit based on free speech protections, they have initiated an investigation into potential agitation against an ethnic group, given the proximity of the burning to the mosque, reported The Guardian.

Despite attempts to ban the protest due to security concerns, an appeals court in June ruled in favor of allowing it, considering Quran burnings as religious criticism rather than incitement to hatred, AFP reported.

This nuanced response has left Swedish authorities grappling with public sentiment and the ongoing debate over freedom of speech versus religious sensitivity.

Adding fuel to fire was the targeted DDoS attacks on Swedish facilities seemingly handpicked to create maximum inconvenience for citizens.

Coincidentally, many of the hacker groups that disclosed their cyber attacks on Sweden claim to be based in several of the OIC countries. However, peel away the apparent retaliation from the Islamic world, and another geopolitical campaign comes to play.

Act 2: Swedish NATO membership and cyber attacks on Sweden

Cyber attacks on Sweden following the latest Islamophobic incident during Eid al-Adha in Stockholm raised concerns about the approval of Swedish NATO membership.

The latest incident has made obtaining parliamentary approval from Turkey and Hungary before the upcoming NATO summit significantly harder.

However, negotiations at NATO headquarters have not been cancelled. The Cyber Express analysis of the situation shows a key reason: Turkey and Hungary have recognized the effect of possible external manipulations in the situation. All fingers point to Russia.

Former Turkish ambassador to Sweden, Selim Kuneralp, suggested that Turkish President Recep Tayyip Erdoğan’s negative but restrained response to the Quran-burning incident reflects a shift in his thinking, reported DW.

According to Kuneralp, Erdogan is reconsidering his relationship with Russian President Vladimir Putin after recent challenges to Putin’s leadership.

In addition to Turkey’s block, Hungary’s ratification of Sweden’s NATO bid is pending. Hungarian Prime Minister Viktor Orban has assured Sweden’s Prime Minister Ulf Kristersson that the ratification process will not be delayed, but parliamentary decision is not expected until the fall.

Erdogan’s refusal to let the incident impact relations with Sweden may indicate his recognition of external manipulation potentially by Moscow, as evident from the previous DDoS attack campaigns.

Act 3: Islamophobia, a flashback

The previous Quran-burning incident took place on January 25, 2023, during a protest organized by controversial far-right journalist Rasmus Paludan, a dual Danish-Swedish national with a history of carrying out similar acts.

Pauldan received financial support from Chang Frick, a Russian citizen and journalist with links to the Kremlin, reported The Guardian.

According to The Guardian’s report, Paludan not only provided monetary assistance to the far-right group but also has close connections to several individuals associated with the Russian government.

As if on cue, Anonymous Sudan and a slew of cybercriminal groups jumped in with their pro-Islam rhetoric, launching cyber attacks on Sweden.

Turkey was livid, increasing the possibility that the country would veto Sweden’s NATO entry.

In response to the alarming revelations, the Swedish security service, Säpo, has launched an investigation into the matter.

In a bid to make the most of the latest event, Russian President Vladimir emphasized that such Islamophobic actions are considered criminal in Russia and stated that his country would not tolerate any form of religious disrespect.

His response was widely circulated on Twitter, amidst growing anger and warnings from Muslim nations directed towards Sweden.

Tensions between Russia and NATO have been strained in recent years, particularly following the 2014 annexation of Crimea. Moscow has explicitly expressed its displeasure on the possibility of Sweden and Finland officially joining NATO.

Apart from the possible threat of NATO gaining military might, the 1,340 km international border between Finland and Russia that runs approximately north to south is a concern for Russia.

“Sweden’s partnership with NATO was historically based on its policy of military non-alignment, which changed following Russia’s full-scale invasion of Ukraine in February 2022,” said a NATO statement on ties with Sweden.

“Since 5 July 2022, Sweden has been an official NATO Invitee, attending meetings and coordinating activities with the Allies. It will become a NATO Ally once all Allies have ratified its Accession Protocol.”

While the diplomatic tensions are being eased, cyber attacks on Sweden continue.

Epilogue: DDoS attacks and geopolitical campaigns

Nation-state cyber attackers, backed by governments, employ advanced tactics to achieve their geopolitical goals.

These highly skilled and well-funded actors utilize a range of techniques, including Distributed Denial of Service (DDoS) attacks, to disrupt, damage, manipulate, and intimidate their targets.

“An estimated 90% of Advanced Persistent Threat Groups (APTs) Groups regularly attack organizations outside of the government or critical infrastructure sectors,” said a report on nation-state attackers by Graphus AI.

“Russian nation-state actors are increasingly effective, jumping from a 21% successful compromise rate in 2020 to a 32% rate in 2021.”

In the realm of geopolitics, DDoS attacks play a crucial role in perception management and information warfare.

“Since late 2022, we have noticed a series of hacktivist campaigns against Western targets led by pro-Russian groups with names like ‘Killnet’,” ,” said the Cloudflare DDoS Trends Report.

“Based on our observations, these groups are loosely organized gangs of hackers using Telegram channels and they do not employ any sophisticated techniques or tools. More recently, we have seen groups like AnonymousSudan join these efforts.”

Selectively targeting websites, online platforms, or communication channels allows attackers to disrupt the flow of information, suppress freedom of speech, and manipulate public opinion.

By disrupting critical infrastructure or online services, attackers convey a strong message, showcasing their capabilities and potentially deterring future actions against them. These attacks serve as a warning to rival nations or organizations.

These attacks, timed during critical events like elections or protests, shape narratives, create confusion, and undermine coordination among targeted groups.

“Finland saw a triple-digit increase in DDoS attacks after announcing it would apply for NATO membership, while Taiwan and Belize experienced much greater DDoS attack volumes on the days in which public statements were made in support of Ukraine,” Netscout reported in December 2022.

DDoS attacks enable cyber attackers to cause significant disruption and damage to targeted systems or networks.

By overwhelming resources with a massive volume of malicious traffic, the attackers render the system unavailable to legitimate users. This disruption impacts critical services, hinders communications, and inflicts financial and reputational losses on the targeted entities.

DDoS attacks serve as effective smokescreens, diverting attention and resources while facilitating other covert cyber operations, said a Netscout report.

By overwhelming target defenses, the attackers create chaos, making it harder for defenders to detect and respond to simultaneous attacks or infiltration attempts. This diversion allows attackers to gain an advantage in their information warfare campaigns.

DDoS attacks provide valuable insights for nation-states to assess their own defenses and those of their adversaries.

Conducting controlled DDoS attacks allows them to test target entities’ response capabilities, identify vulnerabilities, and gather intelligence on defensive measures and mitigation techniques employed by their adversaries.

This information empowers attackers to refine their strategies and strengthen their offensive capabilities.

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Cyber attacks on Sweden
Previous Post

Newbie Group Underground Team Ransomware Lists Victim’s Host Information in Ransom Note

Next Post

ZooTampa Targeted in Cyber Assault by BlackSuit Hackers

Next Post
Cyber Attack on ZooTampa

ZooTampa Targeted in Cyber Assault by BlackSuit Hackers

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026
Cyber News

CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

January 8, 2026
Government Cyber Action Plan
Cyber News

UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

January 8, 2026
Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation
Governance

Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

January 9, 2026
CVE-2026-21858
Firewall Daily

New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

January 8, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information