CyberScoop reports that the U.S. Congress' web domain has been hit with a distributed denial-of-service attack by the pro-Russian Killnet hacking operation, resulting in temporary disruption.
Public access to Congress.gov was "briefly affected" by the attack, with the site back in operation only about two hours following the intrusion, according to a spokesperson for the Library of Congress.
"The Library of Congress used existing measures to address the attack quickly, resulting in minimal downtime. The Library's network was not compromised and no data was lost as a result of the attack," said the spokesperson.
Since its emergence following Russia's invasion of Ukraine, Killnet has launched DDoS attacks against a Connecticut-based airport in March before deploying a wave of attacks against numerous organizations in Norway, as well as separate cyber intrusions against Lithuanian targets after the country closed trade routes to and from Kaliningrad, a Russian province bordering Lithuania and Poland.
Officials at the City of Augusta, Georgia, have been noted by Mayor Garnett Johnson to have not communicated with the BlackByte ransomware operation that took credit for a cyberattack against the city that commenced on May 21, according to The Record, a news site by cybersecurity firm Recorded Future.
Online banking accounts in Mexico, Peru, and Portugal have been subjected to the new financially motivated Operation CMDStealer campaign attributed to a Brazilian threat actor, which leverages social engineering techniques to facilitate the deployment of living-off-the-land binaries and scripts, as well as CMD-based scripts for fund exfiltration, according to The Hacker News.
Attacks exploiting a zero-day in the MOVEit Transfer file transfer app to compromise various servers and facilitate data exfiltration efforts have been admitted by the Clop ransomware operation, also known as Lace Tempest, TA505, and FIN11, after the intrusions have been attributed to the group by Microsoft, reports BleepingComputer.