A Rolling Campaign Of Russian Inspired DDoS Attacks

A prolific hacktivist group has launched a series of devastating Distributed Denial-of-service (DDoS) attacks for two years supporting its pro-Russian, anti-Western agenda. According to the latest blog from NetScout the group, which it calls NoName057(16), has conducted over 1,500 DDoS attacks since Russia's failed invasion attempt on Ukraine began in March 2022.

The NoName group has gained notoriety by developing and distributing custom malware, notably the DDoSia attack tool. They are strategically concentrating their efforts on Western nations and NATO members, aligning closely with pro-Kremlin geopolitical interests. 

In fact, Czech Republic, Poland and Spain have endured the highest volume of attacks, while the most targeted industry was critical public infrastructure, namely governmental administration sites, revealing the political agenda and goals of the group.

In terms of attack methodology, the threat actor almost exclusively uses HTTPs-based attack vectors designed to consume targets' bandwidth and resources. 

The DDoSia attack tool works by by over-whelming target sites with many concurrent junk HTTPs requests, with the tool having cross-platform functionality, it is compatible with Windows, Linux, and macOS systems, reflecting a clear attempt by the group to broaden its user base. 

NoName has encouraged ideologically motivated hacktivist volunteers to launch attacks on its behalf by offering digital currency payments to participants in exchange for supplied attack traffic. 

The group has successfully outsourced the growth and maintenance of their attack infrastructure, while at the same time seeking to make it more challenging for defenders to successfully mitigate attacks. 

NetScout:    NetScout:      NetScout:    FINN Partners:      Image: Beebright

You Might Also Read: 

Russia Steps Up Cyberwar Against Ukraine:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Fujitsu Knowingly Supplied Faulty Data To The British Post Office 
Deepfakes Designed To Mislead Voters »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.