Monday, January 6, 2025
HomeCyber AttackDutch Banks are Suffering From Back to Back DDoS Attacks - Online...

Dutch Banks are Suffering From Back to Back DDoS Attacks – Online Banking Goes Offline

Published on

Dutch Banks ABN Amro and Rabobank targeted by DDOS Attacks back to back on 27, May Sunday night and affecting their online banking system an sever went offline.

Cybercriminals launched heavy DDoS Attacks against two banks servers and overwhelming the traffic affected the targeted bank websites.

The Aim of DDoS Attacks is when multiple systems overflow the bandwidth or resources of a targeted system, usually one or more web servers. Such as DDOS Attack is often the result of multiple compromised systems (for example, a botnet) deluging the targeted system with traffic.

- Advertisement - SIEM as a Service

The first DDOS attack was launched against Rabobank and ABN Amro last week (24, May) around 6:00 p.m that cause online and mobile banking went offline iDeal payments and websites were hard to reach for several hours

Nowadays many of the organization such as Banks, Private companies, government organizations are targeted by heavy DDOS attacks and the companies should calculate the Risk and cost of DDOS attack and always keep eyes and their network.

According to Spoke person ABN Amro, cybercriminals are jumping from one bank to the next with these attacks. “It looks like a cat-and-mouse game”

Later experts are auditing the bank’s servers and tried to regain the server and make them online after the 2nd attack on Sunday and BN Amro resolved its problems by 10:00 p.m. on Sunday.

According to nltimes, Rabobank reported that its online services are up and running around 2:00 a.m. on Monday.

“The security of Internet Banking, Mobile Banking and iDeal was never in danger”, a spokesperson for ABN Amro said, according to AD.

ABN Amro and Rabobank apologize to their customers for the inconvenience. since the DDOS attack vector is kept increasing companies should check the DDOS Attack cost based on the company strength and implement the DDOS attack prevention policies.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...

Weaponized Python Scripts Deliver New SwaetRAT Malware

The Python script leverages low-level interactions with the Windows operating system, which imports crucial...

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as...

Malicious npm Packages Stealing Developers’ Sensitive Data

Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Malicious npm Packages Stealing Developers’ Sensitive Data

Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via...