After preliminary investigations by experts, it was concluded that the "denial of service" (DDoS) attack that occurred on Thursday was geographically very broad - it was launched from IP addresses in Russia, Belarus, Vietnam, Korea, the USA, India, Taiwan, and the Baltic states, representatives of the Latvian State Radio and Television Centre (LGCR) reported to the LETA agency.
The Chairman of the Board of the Latvian State Radio and Television Centre (LGCR) Girts Ozols stated that cyberattacks are not uncommon, and in the current geopolitical situation, they are a daily occurrence at the individual, corporate, and national levels. "The most important thing is the recovery time after the attack, and in this case, LGCR specialists managed to restore the availability and operation of all resources within an hour. There were no data leaks or other compromises of resources," noted Ozols.
The attack on the data was not random; it was deliberately organized and managed, and it was constantly adjusted and calibrated according to the counteraction tactics of LGCR.
Ozols explained that DDoS attacks are carried out by simultaneously sending a significant number of requests to the LGCR infrastructure. This time, the number of requests reached two million per second.
Disruptions were observed, for example, in the operation of the State Revenue Service website vid.gov.lv, the Latvija.lv website, the Cabinet of Ministers website mk.gov.lv, the websites of ministries, municipalities, and other state institutions. Users also had no access to the eParaksts.lv website.