Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
16 résultats taggé Noname057(16)  ✕
Hacktivists Target France Over Diplomatic Moves https://cyble.com/blog/hacktivists-france-for-its-diplomatic-efforts/
02/04/2025 15:25:39
QRCode
archive.org
thumbnail

Pro-Russian and pro-Palestinian hacktivist groups share a common adversary in France, leading to coordinated cyberattacks against the country.

cyble EN 2025 Pro-Russian pro-Palestinian hacktivist France cyberattacks Noname057(16) Z-Pentest
Swiss cities targeted by Russian hackers during WEF https://www.swissinfo.ch/eng/workplace-switzerland/schaffhausen-and-geneva-also-affected-by-russian-hacker-attacks/88763740
22/01/2025 21:22:53
QRCode
archive.org
thumbnail

Russian hackers have targeted canton Schaffhausen and the cities of Geneva and Sierre, paralysing their websites on Wednesday morning.

swissinfo EN 2025 Noname057(16) DDoS Wef
Cyber attack on Italy's Foreign Ministry, airports claimed by pro-Russian hacker group https://www.reuters.com/technology/cybersecurity/cyber-attack-italys-foreign-ministry-airports-claimed-by-pro-russian-hacker-2024-12-28/
02/01/2025 22:50:55
QRCode
archive.org

Hackers targeted around ten official websites in Italy on Saturday, including the websites of the Foreign Ministry and Milan's two airports, putting them out of action temporarily, the country's cyber security agency said.
The pro-Russian hacker group Noname057(16) claimed the cyber attack on Telegram, saying Italy's "Russophobes get a well deserved cyber response".

reuters EN 2024 Noname057(16) Italy DDoS
Extracting DDosia targets from process memory https://viuleeenz.github.io/posts/2023/05/extracting-ddosia-targets-from-process-memory/
28/12/2024 11:56:08
QRCode
archive.org

This post is part of an analysis that I have carried out during my spare time, motivated by a friend that asked me to have a look at the DDosia project related to the NoName057(16) group. The reason behind this request was caused by DDosia client changes for performing the DDos attacks. Because of that, all procedures used so far for monitoring NoName057(16) activities did not work anymore.

viuleeenz.github.io EN 2023 analysis NoName057(16) DDoSia NoName057 malware binary digital-forensics exploit-development Reverse-engineering
DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks https://decoded.avast.io/martinchlumecky/ddosia-project-how-noname05716-is-trying-to-improve-the-efficiency-of-ddos-attacks/
28/12/2024 11:54:33
QRCode
archive.org
thumbnail

The new variant of bots implemented an authentication mechanism to communicate with C2 servers and their proxies. Includes IP address blocklisting, presumably to hinder the tracking of the project.

avast EN 2024 2023 Analysis NoName057(16) DDoSia
The Rise of Alliances: NoName057(16)'s Transformation in 2024 https://www.radware.com/security/threat-advisories-and-attack-reports/the-rise-of-alliances-noname057-16-transformation-in-2024/
20/12/2024 09:25:12
QRCode
archive.org
thumbnail

In the dynamic and rapidly shifting landscape of hacktivism, few entities have managed to capture as much attention as NoName057(16). Once branded as the

radware EN 2024 NoName057(16) NoName057 hacktivism DDoS Alliances
DDoS Attacks in Spain https://www.netscout.com/blog/asert/ddos-attacks-spain?ref=news.risky.biz
26/07/2024 08:22:25
QRCode
archive.org
thumbnail

In the wake of Spanish Authorities arresting three individuals associated with NoName057(16), the group declared a "holy war" on Spain. The call to arms encourages all pro-Russian hacker groups to join under the hashtag #FuckGuardiaCivil. Over the past two days, NETSCOUT observed a significant increase in claimed attacks on Spanish websites, coinciding with the call to arms in retaliation for the arrests made. Despite the surge in hacktivist targeting and claims of victory, the daily DDoS attacks manifest as a normal day for Spanish network operators.

netscout EN 2024 NETSCOUT NoName057(16) Spain call-to-arms DDoS
Spanish police arrest three suspects linked to pro-Moscow NoName057(16) hackers https://therecord.media/spain-arrest-noname-russia-hackers
23/07/2024 08:14:44
QRCode
archive.org
thumbnail

Spanish police arrested three suspected members of the pro-Russian hacker group NoName057(16), known for carrying out distributed denial-of-service (DDoS) attacks against Ukraine’s allies.

therecord.media EN 2024 NoName057(16) DDoS Spain pro-Russia
Spanish Police Arrests NoName Hackers https://thecyberexpress.com/spanish-police-arrests-noname-attacks/amp/
22/07/2024 10:36:25
QRCode
archive.org
thumbnail

Spanish Police arrested three individuals on July 20, 2024, who are suspected of participating in a series of cyberattacks targeting critical infrastructure and government institutions in Spain and other NATO countries.

The detainees are believed to be affiliated with the hacktivist group NoName057(16), known for its pro-Russian ideology and launching DDoS attacks against entities supporting Ukraine in the ongoing conflict.

thecyberexpress EN 2024 NoName057(16) busted arrested Spain
Pourquoi les CFF sont la cible favorite des hackers russes https://www.watson.ch/fr/suisse/guerre-contre-l-ukraine/214596644-pourquoi-les-cff-sont-la-cible-favorite-des-hackers-russes
30/04/2024 22:40:01
QRCode
archive.org
thumbnail

Les entreprises de transport investissent massivement dans la sécurité contre les cyberattaques, notamment les CFF, ciblés par des hackers russes.

watson FR CH 2024 CFF transports hackers Russie NoName057(16)
NoName057(16) DDoSia project: 2024 updates and behavioural shifts https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/
01/03/2024 16:43:41
QRCode
archive.org
thumbnail

Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.

sekoia EN 2024 NoName057(16) DDoSia Analysis
NoName057(16) | https://www.netscout.com/blog/asert/noname057-16
17/01/2024 11:29:32
QRCode
archive.org
thumbnail

NoName057(16) relies heavily on HTTPS application-layer DDoS attacks, with many attacks repeatedly sourced from the same attack harness, networks, and targeting similar countries and industries.

netscout EN 2024 ddos russia ukraine NoName057 NoName NoName057(16) DDoS hacktivism geopolitics crypto nato russo-ukrainian http https http-attacks https-attacks application-layer-attacks ddosia bobik ddos-for-hire golang bulletproof
What's in a NoName? Researchers see a lone-wolf DDoS group https://therecord.media/noname-hacking-group-targets-ukraine-and-allies
06/09/2023 14:28:29
QRCode
archive.org
thumbnail

Every morning at roughly the same time, a Russian hacker group known as NoName057(16) carries out distributed denial-of-service (DDoS) attacks on European financial institutions, government websites or transportation services.

therecord EN 2023 NoName057(16) DDoS analysis
Following NoName057(16) DDoSia Project’s Targets https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/
04/07/2023 08:30:18
QRCode
archive.org
thumbnail

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

sekoia EN 2023 DDOSIA NoName057(16)
Ce qui se cache derrière les cyberattaques pro-russes contre la Suisse https://www.watson.ch/fr/international/hacker/187817038-ce-qui-se-cache-derriere-les-cyberattaques-pro-russes-contre-la-suisse
14/06/2023 23:01:36
QRCode
archive.org
thumbnail

Le groupe d'hacktivistes pro-russe «NoName057(16)» poursuit sans relâche ses attaques contre des serveurs suisses. Voici leur organisation sur Telegram.

watson FR 2023 International hacker Technologie Russie NoName057(16) CH NoName
NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO https://www.sentinelone.com/labs/noname05716-the-pro-russian-hacktivist-group-targeting-nato/
12/01/2023 21:54:07
QRCode
archive.org
thumbnail

In the name of Russia's war in Ukraine, NoName057(16) abuses GitHub and Telegram in an ongoing campaign to disrupt NATO's critical infrastructure.

sentinelone EN 2023 NoName057(16) Russia Telegram Hacktivist NATO
4460 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio