Arbor Networks’ Jose Nazario has done some digging into a recent wave of DDoS attacks and suspects attacks on multiple Russian Web sites are politically motivated. He wrote a blog post on his findings today. His research is based on botnet tracking logs from Project Bladerunner, in which Nazario and an intern created a mock bot they coded using Python. According to the logs, attacks on the various sites are politically motivated. “Four are news sites (three belong to journalufa). The other is a candidates site, and all attacks are ongoing,” Nazario writes. “The botnets here are Dirt Jumper and Black Energy. Despite press that the radio station Echo Moscow is getting political pressure for it’s pro-change reporting, we haven’t yet seen their properties struck by attacks as we have in the past.” He added that the botnets behind the attacks have been instrumental in many DDoS attacks in recent weeks, some of which are on commercial properties while others are news sites. “These appear to be their most overtly political targets. In short, these do not appear to be purpose built for political attacks,” Nazario writes. He said Arbor will keep an eye on the situation, which it expects will intensify ahead of March 4 elections. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe