A large-scale distributed denial-of-service (DDoS) attack has targeted Rosselkhoznadzor, Russia's Federal Service for Veterinary and Phytosanitary Surveillance, causing significant disruption to the nation's food supply chain. The attack, which began on October 22, 2025, overwhelmed the agency's information systems, including the critical 'Mercury' platform used for issuing mandatory electronic veterinary certificates. As a result, major food producers were unable to ship goods, leading to hours-long delays and logistical chaos. This incident underscores the profound impact that cyberattacks on government agencies can have on a nation's critical infrastructure and economic stability.
The attack commenced at 8:40 a.m. on October 22, 2025, targeting Rosselkhoznadzor's public-facing information systems. The primary targets were the VetIS, Saturn, and Mercury platforms. The 'Mercury' system is particularly critical, as it manages the electronic certification required for the legal transportation and sale of all animal products, including meat, milk, and fish, as well as baby food. The unavailability of this system brought a significant portion of the country's food distribution to a halt. Producers were unable to generate the necessary electronic documents, and some retailers reportedly refused to accept shipments with paper-based certificates, which were attempted as a workaround. No specific threat actor has claimed responsibility for the attack.
VetIS, Saturn, and Mercury information systemsThe attack was characterized as a 'large-scale targeted DDoS attack' by Rosselkhoznadzor itself. While specific technical details about the attack vectors (e.g., volumetric, protocol, or application-layer) were not disclosed, the goal was to exhaust the resources of the agency's servers and network infrastructure, making them unavailable to legitimate users. The primary MITRE ATT&CK technique at play is T1498 - Network Denial of Service. The response involved engaging major Russian telecommunication providers like Megafon and Rostelecom to filter the malicious traffic before it reached the agency's servers. This suggests the attack was volumetric in nature, involving a high rate of incoming packets from a distributed network of sources (a botnet). The agency stated that data integrity was not compromised, which is consistent with the goals of a DDoS attack (disruption, not theft).
The immediate impact of the DDoS attack was the severe disruption of Russia's food supply chain. Without access to the 'Mercury' system, producers of perishable goods like milk and meat could not legally ship their products to retailers, leading to significant logistical bottlenecks and potential financial losses due to spoilage and contractual penalties. The incident highlights a critical dependency on a single electronic system for a vital national function. The reliance on digital certification, while efficient, creates a single point of failure that can be exploited by attackers to cause widespread real-world consequences. This attack serves as a case study in how cyberattacks on government IT systems can directly impact the physical world and the daily lives of citizens.
No specific Indicators of Compromise were provided in the source articles.
Detecting and responding to large-scale DDoS attacks requires specialized tools and processes.
Network Traffic Analysis (D3-NTA).Protecting critical infrastructure from DDoS attacks requires a proactive, defense-in-depth strategy.
Inbound Traffic Filtering (D3-ITF).Using a cloud-based or on-premise DDoS mitigation service to detect and scrub malicious traffic before it reaches critical systems.
Coordinating with upstream ISPs to block malicious traffic at the carrier level, reducing the load on the target's own infrastructure.
Mapped D3FEND Techniques:
To defend against large-scale DDoS attacks like the one on Rosselkhoznadzor, organizations must employ specialized Inbound Traffic Filtering, typically through a dedicated DDoS mitigation provider. These cloud-based services act as a 'scrubbing center,' routing all incoming traffic through their global network. They use advanced algorithms and massive bandwidth capacity to absorb and filter out malicious traffic (e.g., SYN floods, UDP amplification) while allowing legitimate user traffic to pass through to the organization's servers. For a critical national system like 'Mercury,' an 'always-on' deployment is recommended, where traffic is constantly filtered. This prevents the initial outage and service degradation that occurs while a reactive, on-demand solution is being activated. This is the most effective way to ensure the availability of public-facing services against volumetric attacks.
Continuous Network Traffic Analysis is crucial for early detection of DDoS attacks. By establishing a baseline of normal traffic patterns for the 'Mercury' and 'VetIS' systems—including volume, packet types, and source geographies—Rosselkhoznadzor can set up automated alerts for significant deviations. For example, a sudden, massive spike in UDP traffic from thousands of disparate IPs would be a clear indicator of a volumetric attack. Flow analysis tools (like NetFlow or sFlow) should be deployed at the network edge to provide this visibility. This analysis not only helps in early detection, allowing for a faster response (like activating a mitigation service), but also provides valuable forensic data post-attack to understand the attack vectors and improve defenses for the future.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats