May 2022: The BSI continues to identify an increased threat situation for Germany. This generally also applies to critical infrastructures. The BSI therefore continues to call on companies, organizations and authorities to review their IT security measures and adapt them to the existing threat situation. The BSI provides further information on the threat situation as well as concrete information on the implementation of cyber security measures on its websites and as part of the Alliance for Cyber Security .
Since Russia's attack on Ukraine began, there have been a few additional IT security incidents in Germany, but these have only had isolated effects.
DDoS attacks
DDoS attacks in particular have been recorded recently, including on targets in Germany. In most cases, these attacks could be repelled or had only a minor impact. However, companies and organizations should pay particular attention to protecting against these types of attacks.
There have also been cyber attacks on companies and institutions that continue to have business relationships with Russia.
Significant risk potential
The BSI also points out that attacks on IT systems such as hacking websites or participating in DDoS attacks are prohibited and pose a significant risk potential. The reasons for this include, among other things, the unforeseeable consequences of cyber attacks of all kinds, for example with regard to existing dependencies of the attacked systems. In addition, retaliatory measures are just as conceivable as possible phishing attempts in connection with calls for participation.
The BSI has repeatedly sensitized and specifically informed its target groups, including the federal administration, operators of critical infrastructure and other organizations and companies, and is once again calling for increased vigilance and willingness to react.
The BSI, as the federal cyber security authority, is constantly in close contact with the Federal Ministry of the Interior and Homeland as well as numerous national and international partner authorities to assess the IT security situation.
Source: BSI
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

