The attack on the Swiss Parliament's website, identified as a Denial-of-Service attack, caused temporary disruption, but most likely with no sensitive data being compromised. While the motives and perpetrators remain unknown, speculation has arisen regarding foreign involvement. The Swiss National Cyber Security Centre (NCSC) and the Federal Office of Police (Fedpol) are assisting in the defence against the attacks.
Dreamlab Technologies has shed light on previous attacks targeting Swiss digital infrastructure: in April 2023, a group known as Bloodnet targeted multiple Swiss websites, followed by an attack on the Hungarian Parliament in May 2023. Dreamlab also uncovered the creation of anonymous Twitter accounts associated with Switzerland, focusing on the conflict in Ukraine. While these findings suggest possible connections, concrete evidence linking a foreign nation to the attack on the Swiss Parliament's website is yet to be found.
Marc K. Peter, COO of Dreamlab Technologies, acknowledged the potential use of disinformation in these attacks: “Fake news and the manipulation of public opinion through social networks are a well-known geopolitical tactic". According to Dr. Peter, the attack on the Swiss Parliament was only partially successful as it garnered media attention but did most likely not enable access to sensitive information.
These cyberattacks are not isolated incidents as similar attacks have been observed in the European Parliament, as well as in Poland, Slovakia, Finland, and Israel. These incidents highlight the ongoing challenges posed by cyberattacks and the need for robust cybersecurity measures to safeguard sensitive information and protect vital infrastructure.
Read the full article (in German):
https://www.tagesanzeiger.ch/kurz-vor-selenski-rede-wird-parlaments-website-lahmgelegt-596386501736
Read the full article (in French):
https://www.24heures.ch/le-site-du-parlement-paralyse-juste-avant-le-discours-zelensky-630617563288