Threat Management
Significant growth in pro-Russia DDoSia project membership reported
Share
More than 10,000 threat actors have become active members of pro-Russian hacktivist operation NoName057(16)'s crowdsourced DDoSia platform, signifying a 2,400% growth since its emergence last summer, as the platform's main Telegram channel secured 45,000 subscribers, reports BleepingComputer.
DDoSia has employed a fully automated registration process for new users, with a Telegram bot providing a unique client ID once members provide their Telegram Open Network wallet address, a Sekoia report showed. Members are then given a ZIP archive with the attack tool containing payloads that could be executed with the placement of the client ID text file in the same folder containing the payloads. Most DDoSia attacks between May 8 and June 26 were found to be aimed at targets in Lithuania, Ukraine, and Poland, with the intrusions associated with the countries' opposition to Russia, while a Ukrainian education site, Ukraine government electronic journal, and a Ukrainian education support site were the three most targeted sites during the same period.
Related Events
Related Terms
BackdoorBotnetCorruptionDeauthentication AttackDeepfakeDefacementDictionary AttackDistributed ScansDrive-by DownloadDumpSecGet daily email updates
SC Media's daily must-read of the most current and pressing daily news