Cyber attacks on Ecuador double after Julian Assange arrest

The country's government sees 40 million attacks per day since the WikiLeaks founder was removed

Ecuadorean embassy

Hacking attempts on the Ecuadorean government have doubled since Julian Assange was arrested inside the country's London embassy last week.

According to Reuters, telecommunications vice minister Patricio Real told reporters that the websites for the country's presidency, central bank and foreign ministry has received 40 million hacking attempts per day since the WikiLeaks founder was arrested and removed by police on Thursday.

"During the afternoon of April 11 we jumped from 51st place to 31st place worldwide in terms of the volume of cyber attacks," Real said.

Real didn't provide any details as to who or where the attacks had come from and said it would be difficult to identify the hackers. However, he did say the hacking group Anonymous, which has taken credit for cyber attacks on government institutions in the US and UK, had made a threat.

Advertisement
Advertisement - Article continues below

He also said the hacking attempts had not led to the theft of any government data but had made it difficult for employees and citizens to access accounts on the sites. The South American country will receive cyber security assistance from Israel.

Assange had been seeking asylum in the Ecuadorean embassy since 2012 to avoid extradition to Sweden in a sexual assault investigation. These chargers have since been dropped but over the course of seven years, the relationship between Assange and the embassy soured dramatically.

WikiLeaks claimed the embassy has been trying to find a mechanism to eject him for some time and have taken steps to make life difficult for Assange, such as cutting off his internet access in 2016.

After his arrest, US prosecutors announced charges against Assange for allegedly conspiring with former army intelligence analyst Chelsea Manning to gain access to a government computer as part of one of the largest compromises of classified information in US history.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/business-strategy/it-infrastructure/354188/tsb-payment-delays-suggest-second-it-meltdown
IT infrastructure

TSB payment delays suggest second IT meltdown

22 Nov 2019