Researchers from cybersecurity vendor CrowdStrike have detected a denial-of-service (DoS) attack compromising Docker Engine honeypots to target Russian and Belarusian websites amid the ongoing Russia-Ukraine war. According to the firm, the honeypots were compromised four times between February 27 and March 1, 2022, with two different Docker images that both share target lists that overlap with domains reportedly shared by the Ukraine government-backed Ukraine IT Army.
CrowdStrike has therefore linked the attacks to pro-Ukrainian activity against Russia. It has also warned of the risk of retaliatory activity by threat actors supporting the Russian Federation against organizations being leveraged to conduct disruptive attacks against government, military, and civilian websites.
More Stories
Windscribe Acquitted on Charges of Not Collecting Users’ Data
The company doesn’t keep logs, so couldn’t turn over data: Windscribe, a globally used privacy-first VPN service, announced today that...
Uyghur Diaspora Group Targeted with Remote Surveillance Malware
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according...
Half of Mobile Devices Run Outdated Operating Systems
50% of mobile devices run outdated operating systems, increasing vulnerability to cyber-attacks, according to the latest report from Zimperium Read...
Researchers Note 16.7% Increase in Automated Scanning Activity
According to the 2025 Global Threat Landscape Report from FortiGuard, threat actors are executing 36,000 scans per second Read More
2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types
New Global Data Helps Organizations Move to Cyber Resilience and Shatter Silos It is no secret that AI is advancing...
ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies
An ISACA survey found that just 5% of organizations have a defined strategy to defend against quantum-enabled threats Read More