Major Ukrainian online bank Monobank faced a distributed denial-of-service attack over the weekend that involved 580 million service requests, marking the bank's largest DDoS attack yet amid the spate of such incidents against financial organizations across the country, reports The Record, a news site by cybersecurity firm Recorded Future.
Monobank was noted by its CEO, Oleh Horokhovskyi, to have experienced a "non-stop" deluge of DDoS attacks, with the bank being among the most targeted IT entities across Ukraine, although neither the bank nor Horokhovskyi elaborated on the identity of the potential perpetrators of the attack. Monobank most recently reported immediate recovery from a DDoS attack earlier last month that coincided with Russian hackers' compromise of Kyivstar, the largest telecommunications provider in Ukraine.
Such an incident also comes a month after Ukrainian financial organizations have been warned by the country's Computer Emergency Response Team regarding attacks from Russian hacking operation UAC-0006.
There has been no evidence that individuals with the Biden campaign responded to the unsolicited emails, according to the agencies, which noted that U.S. media organizations have also been provided with Trump campaign-related information by the hackers.
After establishing trust with targets via spear-phishing emails purporting to be job openings for senior-/manager-level employees in high-profile companies, UNC2970 proceeded to deliver a malicious ZIP file masquerading as a job description, an analysis from Google Cloud's Mandiant revealed.
More than 260,000 devices have been part of the Mirai-based botnet, which has been controlled by the Integrity Technology Group using IP addresses of the China Unicom Beijing Province Network, most of which were from the U.S.