• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

KillNet Group Uses DDoS Attacks Against Azure-Based Healthcare Apps

You are here: Home / General Cyber Security News / KillNet Group Uses DDoS Attacks Against Azure-Based Healthcare Apps
March 20, 2023

The Russia-affiliated hacktivist team recognized as KillNet has been observed concentrating on health care programs hosted working with the Microsoft Azure infrastructure for more than a few months.

The tech large unveiled details about the new marketing campaign in an advisory posted on Friday. The Azure Network Security Crew reported it noticed involving 10 and 20 attacks in November 2022 and amongst 40 and 60 day by day attacks in February 2023.

“We tracked attack data as a result of the identical time period of time and observed that DDoS attacks on healthcare corporations did not display seriously higher throughput,” reads the Microsoft technological generate-up.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“There were being a number of attacks hitting 5M packets per 2nd (PPS), but [the] the greater part of attacks have been underneath 2M PPS. These attacks, whilst not really higher, could take down a web site if not shielded by a network security support.”

The tech company also noticed a selection of multi-vector layer 3, layer 4 and layer 7 DDoS attacks.

Browse far more on DDoS attacks below: 2022: DDoS Year-in-Evaluation

“In contrast to general DDoS attack traits for 2022, in which TCP was the most frequent attack vector, 53% of the attacks on health care had been UDP floods, and TCP accounted for 44%, reflecting a unique mixture of attack patterns applied by adversaries on health care,” reads the advisory.

In conditions of focused healthcare organizations in the course of these attacks, Microsoft said KillNet’s most important focus was on pharma and lifetime sciences (31%), adopted by hospitals (26%), healthcare coverage/overall health companies and treatment (16% every). Geography-sensible, most KillNet attacks came from the US, Russia or Ukraine.

“These attacks had been properly mitigated for customers enrolled in Azure DDoS Network Safety and Web Software Firewall expert services,” Microsoft clarified.

At the identical time, the Azure Network Security Workforce warned that, as a result of the use of DDoS scripts and stressors, botnets and spoofed attack resources, KillNet could easily disrupt sites and apps, if not adequately safeguarded. 

The tech giant’s advisory arrives a couple of months just after KillNet hacktivists reportedly qualified and introduced down quite a few hospital internet sites across the US and the Netherlands.


Some pieces of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Mispadu Trojan Steals 90,000+ Banking Credentials From Latin American Victims
Next Post: Hackers Steal Over $1.6 Million in Crypto from General Bytes Bitcoin ATMs Using Zero-Day Flaw hackers steal over $1.6 million in crypto from general bytes»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.