Warning: Increased Risk of DDoS Attacks
Masaryk University's cybersecurity team warns of a possible wave of DDoS (Distributed Denial of Service) attacks targeting the availability of websites and online services. This warning is primarily intended for system and service administrators.
3 Feb 2026
Warnings
What is it about?
A DDoS attack is a deliberate flooding of a service (e.g., a website) with a large volume of requests from many sources (botnets, “DDoS-for-hire” services). The attackers’ goal is to disrupt availability — so users can’t connect, the page won’t load, or the service keeps crashing.
How does a DDoS attack manifest?
- The website or service is slow or becomes unavailable.
- Login attempts fail, or the application times out and crashes.
- Traffic and error rates (4xx/5xx) spike in monitoring; the reverse proxy/WAF becomes overloaded.
A DDoS attack can also be a “smokescreen,” which is why it’s important to monitor for other suspicious activity at the same time (unusual access patterns, phishing, etc.). Interested in more typical DDoS indicators? You can find them in our article.
In practice, this is a very common type of incident: in the ENISA Threat Landscape 2025 report covering 1 July 2024 – 30 June 2025, ENISA analyzed a total of 4,875 cybersecurity incidents, of which DDoS accounted for roughly 77% of recorded cases.
Most of these attacks are linked to hacktivist campaigns, as they are relatively easy for attackers to carry out.
Why is DDoS relevant in a university environment?
DDoS attacks often target highly visible, publicly accessible services — typically institutional websites. Masaryk University faced a major DDoS attack in December 2025 targeting IS MU (15–16 December 2025). Since then, we have also recorded repeated smaller DDoS attempts against university services and network infrastructure (including the muni.cz website). Thanks to strengthened protection layers, however, most of these attacks do not have any noticeable impact on end users.
Universities are a natural target mainly because of:
- public websites and information portals,
- peak traffic periods (enrollment, admissions, deadlines, conferences),
- interconnected services (an outage in one component can reduce the availability of others).
The timeliness of this threat is also confirmed by other recent attacks across the Czech Republic and abroad:
- 19 Jan 2026 (Czech Republic) – The Ministry for Regional Development’s public procurement portal (portal-vz.cz) was taken offline by attackers.
- 20 Jan 2026 (Luxembourg) – Government portals (e.g., Guichet.lu under the public.lu domain) were briefly unavailable following a DDoS attack that disrupted part of the public online services.
- 2 – 18 Dec 2025 (Belgium) – Ahead of the EU summit, roughly 1,250 DDoS attacks/attempts against government institutions were recorded (including the federal parliament’s website and provincial websites).
- 22 Dec 2025 (France) – The national postal service La Poste confirmed a denial-of-service attack that made its online services (websites/apps) unavailable.
In December 2025, the Czech National Cyber and Information Security Agency warned about pro-Russian hacktivist groups attacking critical infrastructure entities. For example, it states that the group NoName057(16) primarily focuses on DDoS attacks and that since 2023 it has also recorded incidents targeting Czech institutions and companies. This was confirmed in practice in January: a publicly shared “target list” for the DDoSia tool (associated with NoName) included targets in the Czech Republic as well — e.g., stredoceskykraj.cz, plzensky-kraj.cz, kraj-jihocesky.cz, kr-vysocina.cz, liberec.cz / portal.liberec.cz, portal-vz.cz, or prg.aero (including ftp.prg.aero), among others.
Conclusion
If you notice a service outage as a user, stay calm—there is usually not much you can do from the user side during a DDoS attack. We recommend waiting, or using an alternative channel if one is available. Service administrators should continuously verify the situation in monitoring and logs (reverse proxy/WAF, network traffic) and, depending on the circumstances, activate available countermeasures or temporarily restrict problematic parts of the service.
You can always find key cybersecurity information at Masaryk University at https://security.muni.cz/en.
More articles
All articles