Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Ukrainian Government and Banks Once Again Hit by DDoS Attacks

Ukrainian Government and Banks Once Again Hit by DDoS Attacks

The sites of several Ukrainian government agencies (including the Ministries of Foreign Affairs, Defense, and Internal Affairs, the Security Service, and the Cabinet of Ministers), and of the two largest state-owned banks are again targeted by Distributed Denial-of-Service (DDoS) attacks.

Internet watchdog NetBlocks also confirmed that the websites Privatbank (Ukraine’s largest bank) and Oschadbank (the State Savings Bank) were being hammered in the attacks and knocked down together with Ukrainian government sites.

“Today, websites of a number of government and banking institutions have undergone a massive DDoS attack again. Some of the attacked information systems are not available or work intermittently,” the State Service of Special Communication and Information Protection (SSCIP) of Ukraine said

Also Read: The 7 Fundamental Guide on SOP for Social Media Marketing

Currently, the Ukrainian SSSCIP and other national cybersecurity agencies “are working on countering the attacks, collecting and analyzing information.”

These attacks follow another series of DDoS incidents that impacted Ukrainian government websites and banks last week, taking down the sites of the Ministry of Defense and the Armed Forces of Ukraine.

Privatbank geofencing
Privatbank geofencing (BleepingComputer)

In a report published three days after last week’s incidents, the Computer Emergency Response Team of Ukraine (CERT-UA) said the attackers carried out the February 15th DDoS attacks using DDoS-as-a-Service platforms and multiple bot networks, including Mirai and Meris.

The same day, the White House linked the DDoS attacks to Russia’s Main Directorate of the General Staff of the Armed Forces (also known as GRU).

“We have technical information that links the Russian main intelligence directorate, or GRU, as known GRU infrastructure was seen transmitting high volumes of communication to Ukraine-based IP addresses and domains,” Deputy National Security Advisor for Cyber Anne Neuberger said.

Also Read: 7 Principles of Personal Data Processing

Neuberger added that, even though they had “limited impact,” the attacks can be seen as “laying groundwork” for more disruptive attacks that would come together with a potential invasion of Ukraine’s territory.

The UK government also pointed fingers at Russian GRU hackers being behind the DDoS attacks targeting online services belonging to the Ukrainian military and state-owned bank websites during the last week.

These attacks follow a press release from Ukraine’s Security Service (SSU)—whose website was also impacted—saying that the country is being targeted by a “massive wave of hybrid warfare.

The SSU said earlier this month that it blocked over 120 cyberattacks targeting Ukrainian state agencies throughout January 2022.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us