Elections kick-off sees wave of DDoS attacks hitting European governments

European Union
(Image credit: Shutterstock.com)

Members of the European Union are currently taking part in elections to the European Parliament, presenting a prime opportunity for hacktivists to perform Distributed Denial of Service (DDoS) attacks against political parties across the spectrum.

At time of writing, 8 of the 27 EU members have completed counting their votes, with the preliminary results and exit polls showing gains for right-wing parties.

Article continues below

Russia attacks shared interests

The HackNeT group took responsibility for attacks against two political parties in the Netherlands, the PVV (Party for Freedom) and FvD (Forum for Democracy), both of which have voiced euro-skepticism, anti-NATO sentiment and opposition against the sanctions placed on Russia following its invasion of Ukraine in 2022.

Cloudflare shared statistics on the impacts of the DDoS attacks, with the first attacks topping out at 115 million requests per hour, with a sustained 73,000 requests per second over four hours. The second attack only reached 44 million requests per hour, with a 53,000 request per second peak.

The European Parliament elections took place across the EU through June 6 to June 9, with French President Emmanuel Macron calling a snap election in response to the gains made by far right parties. 

As the results of the elections continue to roll in, the euro has seen a dip in value compared to the dollar and the pound, with European stock markets also taking a hit due to the uncertainty surrounding the French election, and the possibility that other countries may also call snap elections.

More from TechRadar Pro

Benedict Collins
Senior Writer, Security

Benedict is a Senior Security Writer at TechRadar Pro, where he has specialized in covering the intersection of geopolitics, cyber-warfare, and business security.

Benedict provides detailed analysis on state-sponsored threat actors, APT groups, and the protection of critical national infrastructure, with his reporting bridging the gap between technical threat intelligence and B2B security strategy.

Benedict holds an MA (Distinction) in Security, Intelligence, and Diplomacy from the University of Buckingham Centre for Security and Intelligence Studies (BUCSIS), with his specialization providing him with a robust academic framework for deconstructing complex international conflicts and intelligence operations, and the ability to translate intricate security data into actionable insights.