European Commission suffers cyber attack
Unknown hackers disrupt Commission's activities with DDoS attack
The European Commission suffered significant DDoS attack on Thursday, which disrupted its operations from approximately 2pm GMT and was not resolved until later that night.
The attack, which was first reported by Politico, was initially thought to be an attempt to hack into the organisation's systems. However, it was later clarified that, in fact, it was a distributed denial of service (DDoS) attack - a type of cyber assault that floods networks with high volumes of traffic all in one go in an effort to take it offline. In this particular case, it's understood that millions of requests were sent to the EC's servers simultaneously, which the organisation said "saturated [its] network".
In a statement to Politico, an EC spokesperson said: "No data breach has occurred ... the attack has so far been successfully stopped with no interruption of service, although connection speeds have been affected for a time."
However, an insider at the Commission reportedly told the media outlet the disruption was significant enough to halt work for long stretches of the afternoon, as workers were unable to access the internet for hours at a time.
There has been no indication of the source of the malicious traffic, however it does coincide with the EU Ukraine Summit, which is taking place in Brussels, where the European Union "has confirmed a range of specific support programmes designed to foster accountable and transparent governance".
IT Pro has contacted the European Commission for confirmation of the attack and comment on its nature, but hadn't received a response at the time of publication.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now