cyber daily logo

Breaking news and updates daily. Subscribe to our Newsletter

Breaking news and updates daily. Subscribe to our Newsletter X facebook linkedin Instagram Instagram

Killnet uses stolen NATO credentials to create profiles on gay dating site

Pro-Russian hacking group Killnet has claimed that it has delivered a devastating distributed denial-of-service (DDoS) against NATO infrastructure and has successfully stolen the credentials of a number of NATO email accounts.

user icon David Hollingworth
Tue, 11 Apr 2023
KillNet uses stolen NATO credentials to create profiles on gay dating site
expand image

The group has used those details to create dating profiles on a “gay dating portal” that serves the areas of Kyiv and Moldova.

Killnet shared its apparent successes on its Telegram channel, claiming that its DDoS attack had affected 40 per cent of NATO’s network.

“Forty per cent of NATO’s electronic infrastructure was paralysed due to hackers from KillNet,” the groups said, translated from the original Russian. “Cybergospoda put the sites of defence orders, provision and support of the alliance and another pack of sites, without which it will be difficult to work normally.”


“Resources are being put under DDoS attacks right now; it is impossible to log in to accounts. The sites of the command for the development of combat operations, the NATO agency for support, support and procurement, and training cyber centres were distributed.”

The group then added what it had done with the credentials it had stolen.

“We could not help but do this,” the group said, “and registered 150 hacked NATO employees’ emails on the gay dating portal in Kiev and Moldova."

The post included a photo of the newly created accounts and a swathe of email addresses from what appears to be the NATO School Oberammergau (NSO).

The NSO offers training in the areas of “strategy, policy, doctrine and procedures”.

Killnet was formed in March 2022 and has taken responsibility for attacks on government websites in Romania, Moldova, and the Czech Republic. The group has gone after a range of targets in Italy, including more government sites and the voting infrastructure for the Eurovision song contest, which Italy was hosting.

More recently, it targeted 14 hospitals in the United States with DDoS attacks and a number of airports and law enforcement agencies in Germany.

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.