Numerous government-operated websites have fallen victim to a cyber attack resembling a distributed denial of service (DDoS) assault. In this type of attack, botnets generate fake web traffic aimed at overwhelming web servers, causing immediate disruptions.
Curiously, this attack occurred just as a Peace Summit between Ukraine and Russia is scheduled to convene at the Burgenstock Resort in Switzerland from June 15th to June 16th, 2024, under the auspices of Swiss President Viola Amherd.
Security experts speculate that this attack may serve as a diversion, drawing attention away from the day-long conference aimed at resolving the ongoing three-year conflict between the nations led by Volodymyr Zelenskyy and Moscow.
While the ramifications of these peace talks loom large, the National Cyber Security Centre has issued a warning, anticipating further attacks in the coming days, with an escalation in intensity and the emergence of new malware variants.
Meanwhile, the Ukraine Cyber Police have apprehended a national suspect believed to be involved in facilitating the spread of LockBit and Conti ransomware. The 28-year-old individual suspected to be a programmer was apprehended in Kharkiv for developing cryptors capable of evading detection by anti-malware solutions.
With substantial evidence incriminating him, the suspect faces severe penalties, including imprisonment for up to 15 years for disobeying criminal code of Ukraine.
Now, a revelation that may startle many: According to a survey by Chainalysis, darknet and breach forums received a staggering $1.7 billion in currency in 2023. If law enforcement and governments fail to devise effective strategies to combat this threat, these figures could double or even triple in 2024. Complicating matters, these monetary transactions often occur in cryptocurrency, making it exceedingly difficult to trace the funds or identify the individuals or cyber groups involved.