Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
6 résultats taggé DDoSia  ✕
Extracting DDosia targets from process memory https://viuleeenz.github.io/posts/2023/05/extracting-ddosia-targets-from-process-memory/
28/12/2024 11:56:08
QRCode
archive.org

This post is part of an analysis that I have carried out during my spare time, motivated by a friend that asked me to have a look at the DDosia project related to the NoName057(16) group. The reason behind this request was caused by DDosia client changes for performing the DDos attacks. Because of that, all procedures used so far for monitoring NoName057(16) activities did not work anymore.

viuleeenz.github.io EN 2023 analysis NoName057(16) DDoSia NoName057 malware binary digital-forensics exploit-development Reverse-engineering
DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks https://decoded.avast.io/martinchlumecky/ddosia-project-how-noname05716-is-trying-to-improve-the-efficiency-of-ddos-attacks/
28/12/2024 11:54:33
QRCode
archive.org
thumbnail

The new variant of bots implemented an authentication mechanism to communicate with C2 servers and their proxies. Includes IP address blocklisting, presumably to hinder the tracking of the project.

avast EN 2024 2023 Analysis NoName057(16) DDoSia
NoName057(16) DDoSia project: 2024 updates and behavioural shifts https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/
01/03/2024 16:43:41
QRCode
archive.org
thumbnail

Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.

sekoia EN 2024 NoName057(16) DDoSia Analysis
NoName057(16) | https://www.netscout.com/blog/asert/noname057-16
17/01/2024 11:29:32
QRCode
archive.org
thumbnail

NoName057(16) relies heavily on HTTPS application-layer DDoS attacks, with many attacks repeatedly sourced from the same attack harness, networks, and targeting similar countries and industries.

netscout EN 2024 ddos russia ukraine NoName057 NoName NoName057(16) DDoS hacktivism geopolitics crypto nato russo-ukrainian http https http-attacks https-attacks application-layer-attacks ddosia bobik ddos-for-hire golang bulletproof
Following NoName057(16) DDoSia Project’s Targets https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/
04/07/2023 08:30:18
QRCode
archive.org
thumbnail

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

sekoia EN 2023 DDOSIA NoName057(16)
Pro-Russia hackers use Telegram, GitHub to attack Czech presidential election https://therecord.media/pro-russia-hackers-use-telegram-github-to-attack-czech-presidential-election/
15/01/2023 16:07:24
QRCode
archive.org
thumbnail

The Record by Recorded Future gives exclusive, behind-the-scenes access to leaders, policymakers, researchers, and the shadows of the cyber underground.

therecord EN 2023 Telegram GitHub Pro-Russia Czech election DDOSIA Sentinelone
4366 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio