0 0
Read Time:1 Minute, 11 Second

August 25, 2022, Chisinau – The Information Technology and Cyber ​​Security Service (STISC) reports that several attempts of cyber attacks on information systems of national importance have been prevented over the past 72 hours.

About 80 information systems, platforms and public portals became the target of the attacks, the impact on their work was limited. The nature of the attacks is complex, along several vectors, having a continuous adaptive nature to the response measures taken. Their intensity varied, constantly increasing during the day and decreasing at night. All attempts to compromise systems are reported to law enforcement.

The purpose of these cyberattack attempts was to cause the information resources of the state to become unavailable by sending a large number of connection requests or a large amount of data in order to overload the computing resources of information systems.

According to the preliminary analysis, the attacks are distributed and carried out from outside the Republic of Moldova, from IP addresses located in different countries, from compromised equipment and networks – a typical situation for such cyber incidents.

STISK, together with the target authorities and law enforcement agencies, is working on alert to repel attacks, minimize their impact, ensure the operability of state information systems and identify those involved and then bring them to justice.

We clarify that STISC constantly monitors the dynamics of attacks, and the development of the situation with cyber attacks will be periodically reported.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence