Tuesday, March 19, 2024

Dutch Banks are Suffering From Back to Back DDoS Attacks – Online Banking Goes Offline

Dutch Banks ABN Amro and Rabobank targeted by DDOS Attacks back to back on 27, May Sunday night and affecting their online banking system an sever went offline.

Cybercriminals launched heavy DDoS Attacks against two banks servers and overwhelming the traffic affected the targeted bank websites.

The Aim of DDoS Attacks is when multiple systems overflow the bandwidth or resources of a targeted system, usually one or more web servers. Such as DDOS Attack is often the result of multiple compromised systems (for example, a botnet) deluging the targeted system with traffic.

The first DDOS attack was launched against Rabobank and ABN Amro last week (24, May) around 6:00 p.m that cause online and mobile banking went offline iDeal payments and websites were hard to reach for several hours

Nowadays many of the organization such as Banks, Private companies, government organizations are targeted by heavy DDOS attacks and the companies should calculate the Risk and cost of DDOS attack and always keep eyes and their network.

According to Spoke person ABN Amro, cybercriminals are jumping from one bank to the next with these attacks. “It looks like a cat-and-mouse game”

Later experts are auditing the bank’s servers and tried to regain the server and make them online after the 2nd attack on Sunday and BN Amro resolved its problems by 10:00 p.m. on Sunday.

According to nltimes, Rabobank reported that its online services are up and running around 2:00 a.m. on Monday.

“The security of Internet Banking, Mobile Banking and iDeal was never in danger”, a spokesperson for ABN Amro said, according to AD.

ABN Amro and Rabobank apologize to their customers for the inconvenience. since the DDOS attack vector is kept increasing companies should check the DDOS Attack cost based on the company strength and implement the DDOS attack prevention policies.

Website

Latest articles

CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence

AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in...

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated...

Researchers Hack AI Assistants Using ASCII Art

Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts...

Microsoft Deprecate 1024-bit RSA Encryption Keys in Windows

Microsoft has announced an important update for Windows users worldwide in a continuous effort...

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles