SHARE
Facebook X Pinterest WhatsApp

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

A series of distributed denial of service (DDoS) attacks today briefly took down the websites of over a dozen U.S. airports, including those for Atlanta and Los Angeles International Airports. The attacks followed a recent Telegram post by the pro-Kremlin hacker group Killnet listing 46 websites to be targeted. Still, as NBC News noted, some […]

Written By: Jeff Goldman
Oct 10, 2022
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A series of distributed denial of service (DDoS) attacks today briefly took down the websites of over a dozen U.S. airports, including those for Atlanta and Los Angeles International Airports. The attacks followed a recent Telegram post by the pro-Kremlin hacker group Killnet listing 46 websites to be targeted.

Still, as NBC News noted, some of the targets on the list seemed like the result of translation errors – rather than targeting Chicago’s O’Hare Airport website, for example, the hackers listed the Chicago Department of Aviation site, flychicago.com.

It’s worth noting that while the attacks drew attention and may have frustrated some people seeking travel information, no airport or airline operations were affected.

See the DDoS Protection Service Providers

An Ongoing Pattern of Attacks

Killnet has been launching similar DDoS attacks for months, targeting everything from Romanian government websites to Lithuania’s Secure Data Transfer Network.

In April 2022, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) named Killnet as one of eight key Russian-aligned cybercrime groups that pose a threat to critical infrastructure, noting that in March 2022, the group had claimed credit for a DDoS attack on the website for Connecticut’s Bradley International Airport in response to U.S. support for Ukraine.

“U.S., Australian, Canadian, New Zealand, and UK cyber authorities urge critical infrastructure organizations to prepare for and mitigate potential cyber threats by immediately (1) updating software, (2) enforcing MFA, (3) securing and monitoring RDP and other potentially risky services, and (4) providing end-user awareness and training,” the agency wrote.

How CISOs Should Respond

Andrew Bayers, head of threat intelligence at Resilience, told eSecurity Planet that the potential impact of attacks like these shouldn’t be underestimated, particularly for organizations that rely on Internet connectivity for key operations.

“The threat of DDoS attacks continues to evolve as a threat that can have grave impacts to business operations as companies migrate more resources to the cloud, migrate workforces to remote and/or hybrid environments, and lean on IoT connectivity to conduct operations,” Bayers said.

Attacks like these, Bayers noted, can also serve as a diversionary tactic for sophisticated threat actors. “As IT professionals scramble to free up resources and mitigate a DDoS, attackers lurking in wait can then conduct other attacks such as infiltration operations of a network that may have otherwise been caught,” he said.

In response, Bayers said, CISOs need to take the threat of DDoS seriously as part of a defense-in-depth approach to cyber hygiene. “If your business relies on Internet connectivity to operate, then commodity DDoS protection is a must,” he said.

More broadly, Inversion6 CISO Craig Burland said attacks like these should serve as a reminder of the
importance of ongoing vigilance in cybersecurity operations. “A focus on cybersecurity isn’t
only for when the auditor is coming or after a breach,” he said. “It’s a 24x7x365 responsibility
that we must all own and embrace. We don’t take days off from things like workplace safety or
legal due diligence. Cybersecurity is no different especially as we collectively face organizations
like Killnet.”

Read next: Best Incident Response Tools and Software

thumbnail Jeff Goldman

eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet writer since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.

Recommended for you...

SQL Injection Prevention: 6 Ways to Protect Your Stack

SQL injection is a code injection technique that can expose your data. Learn 5 proven tactics to prevent attacks and secure your applications.

Matt Gonzales
Jul 9, 2025
Microsoft Defender vs Bitdefender: Compare Antivirus Software

Compare Microsoft Defender and Bitdefender antivirus software. We rate malware detection, pricing plans, privacy features, and more.

Jenna Phipps
May 27, 2025
Bitwarden vs Dashlane: Comparing Password Managers

Password managers store and encrypt passwords, making it easy to create, manage, and auto-fill credentials across devices. Compare Bitwarden vs. Dashlane here.

Jenna Phipps
May 14, 2025
What Is Malware? Definition, Examples, and More

Learn what malware is, its various types, and how it can affect your devices. Explore real-world examples and essential tips for protection.

Davin Jackson
Feb 10, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.