European Commission suffers cyber attack

Unknown hackers disrupt Commission's activities with DDoS attack

European Commission

The European Commission suffered significant DDoS attack on Thursday, which disrupted its operations from approximately 2pm GMT and was not resolved until later that night.

The attack, which was first reported by Politico, was initially thought to be an attempt to hack into the organisation's systems. However, it was later clarified that, in fact, it was a distributed denial of service (DDoS) attack - a type of cyber assault that floods networks with high volumes of traffic all in one go in an effort to take it offline. In this particular case, it's understood that millions of requests were sent to the EC's servers simultaneously, which the organisation said "saturated [its] network".

Advertisement - Article continues below

In a statement to Politico, an EC spokesperson said: "No data breach has occurred ... the attack has so far been successfully stopped with no interruption of service, although connection speeds have been affected for a time."

However, an insider at the Commission reportedly told the media outlet the disruption was significant enough to halt work for long stretches of the afternoon, as workers were unable to access the internet for hours at a time.

There has been no indication of the source of the malicious traffic, however it does coincide with the EU Ukraine Summit, which is taking place in Brussels, where the European Union "has confirmed a range of specific support programmes designed to foster accountable and transparent governance".

Advertisement
Advertisement - Article continues below

IT Pro has contacted the European Commission for confirmation of the attack and comment on its nature, but hadn't received a response at the time of publication.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020