Untitled attachment
https://cyberplace.social/system/media_attachments/files/111/646/706/398/654/280/original/80109614c41b400a.png
If it helps anybody prepare for attacks like this, here's an example - init.lt is a telco in country, here's the attacker config.
The infrastructure is on prem.
#NoName don't have much bandwidth as Ddosia is small, what they rely on is webapps failing over under stress.
Each campaign NoName run has a unique ID - when they find an easily downable target, they save the target campaign details and rerun it in the future over and over again on different days to make themselves appear busy.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.