US Airports’ Sites Geo-Poli-Cyber™ DDoS Attacked by Pro-Russian Hackers | “More Attacks on US Expected,” Expert.

Websites of several major airports in the U.S. were Geo-Poli-Cyber hacked thru large-scale distributed denial-of-service (DDoS) attacks that were claimed by pro-Russian hacktivist group ‘KillNet’.

The DDoS attacks crippled the servers that host these sites with a barrage of fake requests which made it impossible for flying passengers to get updates about their scheduled flights or book airport services on these websites.

LA, Chicago, Atlanta & others Hit

The impacted airport sites included one of the US largest air traffic hubs, LAX. The Los Angeles International Airport which went offline and online sporadically and became very slow to respond to genuine travelers’ requests. Other impacted airport websites that actually went done were Hartsfield-Jackson Atlanta International Airport (ATL), Chicago O’Hare International Airport (ORD), Orlando International Airport (MCO), Denver International Airport (DIA), Phoenix Sky Harbor International Airport (PHX), along with some in Kentucky, Mississippi, and Hawaii.

Claimed Responsibility

In claiming responsibility for the attack yesterday, ‘KillNet’ listed the domains on its Telegram channel, where members and volunteers of the hacktivist group gather to acquire new targets.

Khaled Fattal, MLi Group chairman, Survivability Strategies creator and Survivability News publisher said, “Although the DDoS attacks did not impact flights and had no direct or indirect financial benefit to killnet, we at the MLi Group classify them as 100% politically inspired, and therefore, Geo-Poli-Cyber motivated. The attackers’ goal is to disrupt peoples’ daily lives, impact the US economy and public mood, to send the message to American citizens and political leaders.”  

Fattal emphasized, “The attacks are also part of a grander strategy to make the US pay a price for its support of Ukraine against Russia and send US citizens and political leaders a direct message saying “your country is not immune from your proxy war in the Ukraine against Russia. This means that these attacks are the tip of the iceberg of more Geo-Poli-Cyber attacks to come on many US targets including critical national infrastructures if the war continues and a politically negotiated ceasefire is not reached very soon.”

Fattal later added, “I address this in my book ‘Survivability that was published on Amazon on September 11, 2022, and especially in chapter 5: ‘Silent and Undeclared WWIII’.

Russia and its supporters see the US involvement in the Ukraine as a US proxy war against Russia. KillNet has previously targeted other countries that sided with Ukraine, like Romania and Italy, while its “sub-group” Legion struck key Norwegian and Lithuanian entities for similar reasons.

Fattal concluded by saying, “The attacks should be looked at as the price of the US proxy war against Russia in the Ukraine, and part of the price it will pay for its involvement by being the Ukraine’s primary military, financial and intelligence aid for its proxy war with Russia”.

Additionally, the U.S. being the de-facto leader of NATO, further validates the US proxy narrative in light of US sanctions f Russia and KillNet’s expanded targeting to include the U.S. when DDoS group attacked government websites in Colorado, Kentucky, and Mississippi, with success last week.



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?
MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ in 2012. Geo-Poli-Cyber™ hacks are political, ideological, extremist, and ‘religious’ motivated attacks. They are the hacks that cyber security, resiliency and continuity strategies and solutions continue to fail to defend governments and organizations routinely. Key are the destruction/devastation motivated new breed of Geo-Poli-Cyber hackers and lone wolfs who are often directed or backed by not only enemies but presumed allies.
2021 (C) All rights reserved. MLi Group