{
	"id": "461b1bf7-d5a3-443e-9874-da90be2d692f",
	"created_at": "2026-05-01T03:09:48.354727Z",
	"updated_at": "2026-05-01T03:10:50.601366Z",
	"deleted_at": null,
	"sha1_hash": "2063664584a99093fb3bc23b05503c1dcb9d448d",
	"title": "Austria subjected to pro-Russian DDoS intrusions",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2922160,
	"plain_text": "Austria subjected to pro-Russian DDoS intrusions\r\nBy SC Staff\r\nPublished: 2024-09-25 · Archived: 2026-05-01 02:08:02 UTC\r\nThreat Intelligence\r\nSeptember 25, 2024\r\n(Adobe Stock)\r\nMore than 40 Austrian organizations had their websites subjected to distributed denial-of-service attacks by pro-Russia hacktivist operations NoName057(16) and OverFlame that have been underway since last week ahead of\r\nthe country's election on Sunday, according to The Record, a news site by cybersecurity firm Recorded Future.\r\nAside from disrupting the websites of the country's financial service entities, airports, and stock exchange, both\r\nNoName057(16) and OverFlame hackers have also deployed DDoS intrusions against the websites of Austria's\r\nOVP and SPO political parties. However, Radware noted that long-term impact has not been observed from the\r\nhacktivist operations' attacks. Attacks by NoName057(16) have been primarily facilitated by the DDoSia botnet\r\nproject, which is dependent on the usage of other hacktivist groups, according to Radware, which also noted the\r\nCyber Army of Russia Reborn's participation in the latest intrusions. \"It is common to see like-minded threat\r\nactors form ad-hoc alliances and collaborate on campaigns to increase their impact,\" added Radware.\r\nSC Staff\r\nhttps://www.scworld.com/brief/austria-subjected-to-pro-russian-ddos-intrusions\r\nPage 1 of 3\n\nRelated\r\nKryBit retaliates against 0APT with extensive data leak\r\nSC StaffApril 30, 2026\r\nhttps://www.scworld.com/brief/austria-subjected-to-pro-russian-ddos-intrusions\r\nPage 2 of 3\n\nNewly identified ransomware-as-a-service operation KryBit has compromised fellow nascent RaaS gang 0APT\r\nand exposed its full operational information, including access logs, system files, and PHP source code, in\r\nretaliation for the latter's initial leak of some of its data earlier this month, reports Infosecurity Magazine.\r\nReport sheds light on Chinese phishing campaigns against journalists, activists\r\nSC StaffApril 30, 2026\r\nReport sheds light on Chinese phishing campaigns against journalists, activists Chinese state-backed freelance\r\nhackers have launched a pair of phishing campaigns aimed at journalists and opposition activists in Taiwan, Hong\r\nKong, Tibet, and China's Uyghur region in a span of nine months, according to The Record, a news site by\r\ncybersecurity firm Recorded Future.\r\nGet daily email updates\r\nSC Media's daily must-read of the most current and pressing daily news\r\nSource: https://www.scworld.com/brief/austria-subjected-to-pro-russian-ddos-intrusions\r\nhttps://www.scworld.com/brief/austria-subjected-to-pro-russian-ddos-intrusions\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.scworld.com/brief/austria-subjected-to-pro-russian-ddos-intrusions"
	],
	"report_names": [
		"austria-subjected-to-pro-russian-ddos-intrusions"
	],
	"threat_actors": [],
	"ts_created_at": 1777604988,
	"ts_updated_at": 1777605050,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2063664584a99093fb3bc23b05503c1dcb9d448d.pdf",
		"text": "https://archive.orkl.eu/2063664584a99093fb3bc23b05503c1dcb9d448d.txt",
		"img": "https://archive.orkl.eu/2063664584a99093fb3bc23b05503c1dcb9d448d.jpg"
	}
}