Psyonix (Rocket League)
November 24, 2025
•[ denial of service, service disruption ]
Psyonix reported that Rocket League servers were experiencing ongoing attacks that caused service disruptions; the studio implemented code optimizations and new DDoS detection to reduce attack impact but did not report any data theft or identify the attackers. Initially, attackers would join a match, launch their attack, and disconnect all of the other players, forcing an unintentional forfeit. As long as the attacker is the last player to leave a match, they earn the win.
Jackson County Public Schools
November 23, 2025
•[ denial of service, service disruption ]
A reflection DDoS attack on November 23 targeted the district firewall, taking down internet, Wi-Fi, phones, and internal systems for Jackson County Public Schools in North Carolina. Schools closed on November 25 due to continuing network instability. Officials reported no evidence of student or staff data access or theft.
Logius (DigiD national login service)
November 19, 2025
•[ denial of service ]
On November 19, 2025, Dutch digital identity service DigiD was again targeted by a distributed denial-of-service attack. According to Logius, the agency responsible for DigiD, the attack caused intermittent login failures for users during the morning, with a peak in problems around 11:00 before the situation gradually improved as defenses took effect. Officials advised users to wait or try again later while mitigation was ongoing and said they did not yet know who was behind the attack. The incident followed multiple earlier cyberattacks on DigiD in the same year, highlighting persistent targeting of critical e-government authentication services.
Government of Kenya
November 17, 2025
•[ denial of service, defacement ]
Kenyan government websites were the target of cyber attacks promoting white supremacist messages. On November 17, 2025, multiple critical e-government websites in Kenya were made unserviceable by a self-proclaimed hacking group, PCP@Kenya [2]. When users attempted to access these web pages, they would be greeted with denied access, white supremacist messages, and credit to the mentioned group. All government sites are now operational again, just one day after the initial attacks took place.
Sund & Bælt
November 14, 2025
•[ denial of service, hacktivism ]
On November 14, 2025, the Storeblt website operated by Sund & Blt was rendered inaccessible due to an external denial-of-service attack. Sund & Blt confirmed the DDoS incident, and DR reported that the pro-Russian hacktivist group NoName057(16) claimed responsibility on Telegram as part of a broader campaign targeting Danish entities. No data loss occurred.
Borger.dk
November 13, 2025
•[ denial of service, hacktivism ]
On November 13, 2025, Denmark's national citizen service portal Borger.dk was targeted and disrupted by an external denial-of-service attack. The pro-Russian hacktivist group NoName057(16) claimed responsibility on Telegram. No data loss occurred.
Terma
November 13, 2025
•[ denial of service, hacktivism ]
On November 13, 2025, Danish defense contractor Terma experienced a disruption to its public-facing website due to an external denial-of-service attack. The incident was attributed to the pro-Russian hacktivist group NoName057(16). Terma confirmed that no data were lost.
Government of Denmark
November 13, 2025
•[ denial of service, hacktivism, government ]
On November 13, 2025, additional Danish government websites experienced outages due to external denial-of-service attacks. The Danish Civil Protection Agency confirmed that several sites and companies were affected, and the pro-Russian hacktivist group NoName057(16) claimed responsibility for the coordinated campaign. No data loss was reported.
Weda (Medical Software)
November 10, 2025
•[ cyberattack, denial of service, healthcare ]
On November 10, 2025, Weda medical software used by general practitioners across France experienced a major cyberattack that rendered the system inaccessible. Physicians were unable to view or transmit patient medical records for several days. Service resumed only in degraded mode on November 14. No evidence of data encryption or exfiltration has been reported.
Tavria TV and Radio Company
November 8, 2025
•[ denial of service ]
At a media forum interview reported by TASS, the director of TRK Tavria in Russian occupied Kherson said the outlet's website is regularly subjected to DDoS attacks attributed to Ukrainian hackers, with several incidents that took the site down for a period before technicians restored it; he stressed that despite the repeated cyberattacks there has been no serious lasting damage, and that the company continues to operate its regional television, radio and online services.
Ghent University Hospital
November 6, 2025
•[ denial of service, hacktivism ]
According to Belgian News Agency coverage relayed by DataBreaches.net, pro Russian hacktivist group NoName057 claimed responsibility on Telegram for a distributed denial of service attack that briefly disrupted the public websites of Belgian telecom operators Proximus and Scarlet, as well as Ghent University Hospital, on a Wednesday morning in November 2025. Proximus said technicians detected unusual traffic around 7:20 and a sharp rise in volume shortly after, but countermeasures meant overall impact on service was very limited and core systems remained resilient. The group also boasted of targeting an internal Telenet portal, a claim Telenet publicly rejected, emphasizing that its systems were not hacked and no sites went offline, and authorities noted that such DDoS attacks do not involve any compromise of user data.
BLIK
November 1, 2025
•[ denial of service ]
Polish outlet GazetaPrawna, citing BLIKs statements and comments by the minister for digital affairs, reports that from the early morning of November 1, 2025 the operator observed a significant external distributed denial-of-service attack against Polish settlement infrastructure supporting the BLIK mobile payment system. The volumetric attack generated enough malicious traffic to disrupt the smooth processing of BLIK transactions and caused users to encounter problems with mobile payments. BLIKs operator said that it secured the infrastructure, continued to monitor the systems and by 10:33 stated that users should no longer experience transaction issues, later confirming on social media that BLIK functions had been restored and apologizing for the inconvenience while officials noted that such DDoS attacks occur regularly but are usually blocked before users notice.
Municipality of Tirana (City of Tirana)
June 20, 2025
•[ data leak, denial of service, state-sponsored attack ]
Iran-linked MOIS cluster EUROPIUM (Homeland Justice) conducted a coordinated cyberattack on Tiranas municipal government on Jun 20 2025, taking the city website offline and disrupting services; attackers claimed data theft and wiping of city databases; Microsoft and Albanian officials attributed the activity to MOIS-linked operators; restoration completed by Jun 24 2025.
IStories & Verstka (independent media)
June 20, 2025
•[ denial of service ]
Qurium linked a Russian hosting provider (Biterika) to DoS floods that hit IStories and Verstka after a sensitive expos; ownership ties point to a sanctioned tech institute staffer.
Sveriges Television (SVT)
June 10, 2025
•[ denial of service ]
On June 10 2025, Swedens public broadcaster Sveriges Television (SVT) was hit by a massive distributed-denial-of-service campaign that began in the evening and continued into the next morning, flooding servers with traffic from numerous countries. The attackdescribed by SVTs CTO as the largest and longest-lasting ever recordedtemporarily degraded online services and coincided with similar attempts against the Employment Service and banks. Officials said the incident formed part of wider cyber activity targeting Swedish institutions, but attribution and motive remain unconfirmed.
Federal Customs Service; Federal Tax Service; Russian Railways (RZD)
June 10, 2025
•[ denial of service, state-sponsored ]
Ukraines Defense Intelligence Directorate (GUR) conducted coordinated DDoS operations from June 1012 2025 that temporarily paralyzed Russias Federal Customs and Tax Service networks and disrupted Russian Railways ticketing portals. Russias Federal Customs Service acknowledged complications in information exchange consistent with DDoS activity.
Bharatpedia (English Version)
June 8, 2025
•[ denial of service, hacktivism ]
Bharatpedias official X account confirmed a cyberattack on June 8, 2025, that took its English site offline for several days; incident attributed to an external denial-of-service campaign consistent with hacktivist protest activity; no data compromise reported.
Russian Railways (RZD)
June 6, 2025
•[ denial of service ]
On June 6 2025, Russian Railways reported that its website and mobile app were targeted by a distributed denial-of-service attack, temporarily disrupting online ticketing. Physical ticket counters operated normally, and no data theft or encryption occurred.
Черна писта
May 30, 2025
•[ denial of service ]
Bulgarian outlets reported a DDoS that attempted to take down the crash-map site created by 18-year-old Martin Atanasov; the hosting firm confirmed a mass attack and service impact before restoration.
PESEL state registry
May 1, 2025
•[ denial of service ]
A suspected cyberattack temporarily blocked access to Polands state registry systems, including the PESEL database used across government services; local reporting pointed to DDoS disruption with services restored the same day.