Roskomnadzor
February 27, 2026
•[ DDoS attack, multi-vector attack, traffic scrubbing ]
A multi-vector DDoS attack targeted Roskomnadzor online resources. Traffic peaked at 33 Gbps and 36.9 million packets per second before malicious traffic was redirected to scrubbing servers and access was restored.
Ministry of Defence of the Russian Federation
February 27, 2026
•[ DDoS attack, multi-vector attack, cyber attack ]
A multi-vector DDoS attack targeted online resources associated with the Russian Ministry of Defense. Traffic peaked at 33 Gbps and 36.9 million packets per second before mitigation restored access.
Federal State Unitary Enterprise Main Radio Frequency Center
February 27, 2026
•[ DDoS attack, network infrastructure, cyber security ]
A multi-vector DDoS attack targeted infrastructure operated by the Main Radio Frequency Center. Traffic peaked at 33 Gbps and 36.9 million packets per second before malicious traffic was redirected to scrubbing servers and access was restored.
Greenland government-related websites (multiple)
February 20, 2026
•[ DDoS attack, hacktivism, service disruption ]
Greenland media reported that several Greenlandic websites were hit by DDoS attacks on February 20, 2026. Naalakkersuisut stated it was monitoring the situation and assessed that the attacks were not dangerous or harmful to data, but could disrupt availability for short periods. Separate reporting around the same incident attributed the DDoS activity to the pro-Russian hacktivist collective NoName057(16). The confirmed primary effect described is temporary service availability disruption rather than data theft.
Grupo Godo
February 16, 2026
•[ DDoS attack, service availability disruption, cybersecurity protocols ]
Grupo God reported that the websites of La Vanguardia, Mundo Deportivo, RAC1, and RAC105 experienced a coordinated DDoS attack starting around 06:08 that caused slow loading, intermittent errors, and in some cases total access failures. The group said the attack originated from infrastructure located in Germany and that technical teams activated cybersecurity protocols and mitigation measures to restore services, which returned to normal between approximately 07:30 and 07:40. The company stated that technical analysis found no unauthorized access to personal data and that the incident was limited to saturating systems with massive external traffic, making this a service availability disruption without confirmed data theft.
KSeF
February 1, 2026
•[ DDoS attack, service disruption, e-invoicing ]
Polish reporting quoted Finance and Economy Minister Andrzej Domaski stating that early access problems with the KSeF e-invoicing system were due in part to a DDoS attack against the login system, alongside heavy legitimate login attempts. The minister said the DDoS traffic came from 17 countries, which contributed to overload and user access difficulties, and that the situation was brought under control. The reporting does not describe data theft; the primary effect is temporary disruption/degradation of system accessibility due to external traffic flooding.
TELEPORT.RF
January 22, 2026
•[ DDoS attack, availability disruption, denial-of-service ]
The Russian-language news outlet Teleport RF reported that its website (teleport2001.ru) was subjected to a DDoS attack. The report described disruptions to site availability consistent with a traffic-flooding denial-of-service, affecting readers ability to access content. No claims of data theft or system compromise beyond availability disruption were described in the article.
Czech Public Procurement Portal
January 19, 2026
•[ DDoS attack, service disruption, cyberattack ]
Czech authorities reported that the countrys public procurement portal was taken out of service by hackers on Monday, January 19, 2026, in an incident described as a DDoS attack. The Ministry for Regional Development stated the portal was brought back online later that same day and the situation continued to be assessed. Officials emphasized that actual public procurement submissions are handled in a separate system that remained functional, limiting downstream operational disruption primarily to portal availability and access to related information services rather than halting procurement processes entirely.
public.lu
January 19, 2026
•[ DDoS attack, denial-of-service, service disruption ]
Luxembourgs state web domain public.lu experienced a DDoS attack that made several government websites unreachable for roughly forty minutes in the morning (approximately 7:588:39). The national IT center (CTIE) confirmed the incident and stated the disruption was a traffic-flooding denial-of-service event rather than an attempt to expose sensitive data. Impacted sites reported included guichet.lu, Legalux, and CTIEs own web presence; services later returned to normal.
Final Fantasy 14's European or Asian servers
January 6, 2026
•[ DDoS attack, service disruption, distributed denial-of-service ]
Reporting described sustained distributed denial-of-service (DDoS) attacks disrupting Final Fantasy XIVs North American servers during the launch window for a newly released savage raid tier. Players reported frequent disconnects and unstable service during peak playtimes, and community tracking cited repeated incidents throughout the day, including reports of around 15 disruptions in a single day. The disruptions affected progression and organized play and persisted over multiple days.
Gcore
October 1, 2025
•[ DDoS attack, botnet, volumetric flood ]
Technology site CDR.cz and an underlying TechRadar report describe how gaming hosting and cloud provider Gcore was hit in October 2025 by one of the largest DDoS attacks ever recorded, a so called short burst volumetric flood that generated roughly 6 terabits per second of traffic and about 5.3 billion packets per second over 30 to 45 seconds. Analysis attributed the event to the AISURU botnet, with more than half of the malicious traffic sourced from Brazil and about a quarter from the United States, suggesting widespread abuse of poorly secured systems in those regions. Gcore stated that its globally distributed DDoS protection network, with over 210 points of presence and more than 200 terabits per second of filtering capacity, absorbed the attack and kept services online, but security experts warned that such brief, intense
Movement “Ãâ€Ã‘€ÑƒÃ³aѠãúрðøýðâ€Â
September 9, 2025
•[ DDoS attack, website unavailability, cyberattack ]
DDoS attack against the Other Ukraine movements website limited access; technical teams working to restore availability; no attribution or data breach reported.
F.C. Copenhagen live stream (Champions League vs Malmö FF)
August 12, 2025
•[ DDoS attack, service disruption, cyber attack ]
F.C. Copenhagens Champions League stream was disrupted on August 12, 2025, by a large-scale DDoS attack that flooded its login system with traffic equal to six months usage in one hour. Fans were unable to access the match for 28 minutes until an alternate stream was activated. No data was stolen or encrypted.
Finnish polling-place portal (äänestyspaikat.fi)
April 8, 2025
•[ DDoS attack, hacktivism, protest ]
On April 8 2025, NoName057(16) targeted Finlands polling-place website nestyspaikat.fi with a DDoS attack linked to protests over Ukraine policy, briefly disrupting voter-information access.
Zürcher Kantonalbank (ZKB)
January 21, 2025
•[ DDoS attack, NoName, WEF ]
Erneut hat die Hackergruppe NoName aus Russland eine Reihe von Schweizer Websites mit DDoS-Attacken lahmgelegt. Der Zeitpunkt der Angriffe hat wohl vor allem mit der Durchfhrung des WEF zu tun.
Electronic School (ÓØá "ÃÂûõúтрþýýðѠшúþûð"), Novosibirsk
January 15, 2025
•[ DDoS attack, service disruption, cyber attack ]
On January 15, 2025, a powerful DDoS attack targeted Novosibirsks Electronic School digital diary platform. The attack, described as one of the most massive in the region, caused several hours of disruption before service was restored.
Centre des technologies de l’information de l’État' (CTIE)
January 10, 2025
•[ DDoS attack, service outage, government websites ]
Mehrere von der Regierung betriebene und vom Centre des technologies de linformation de ltat (CTIE) gehostete Internetseiten waren am Freitag zwischen 13:05 und 14:55 Uhr nicht erreichbar. Ursache dafr war eine DDOS-Attacke, die zahlreiche Webseiten lahmlegte, darunter men.public.lu und 112.public.lu. Das besttigte eine Sprecherin des CTIE gegenber dem Tageblatt. Der Angriff habe kurz nach 13 Uhr...
Ministry of Defence of Ukraine – Anti-Corruption Council election system
January 7, 2025
•[ DDoS attack, election interference, distributed denial-of-service ]
DDoS attack on Ukraines MoD online election for its Anti-Corruption Council. Over 1.1 million malicious requests blocked, including 300k from Belarus IPs. Attack attempted to disrupt voting but was contained the same day, and election integrity was maintained with ~101k Ukrainians successfully voting.
Tinkoff Bank
July 23, 2024
•[ DDoS attack, distributed denial-of-service, cyber warfare ]
Several large Russian banks confirm that they suffered distributed denial-of-service (DDoS) attacks that temporarily disrupted their mobile apps and websites. Ukraines military intelligence (HUR) claims responsibility for the attack.