New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/27cdcf1412ea028f30e0d96565ca8959
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/27cdcf1412ea028f30e0d96565ca8959
Yesterday's #NoName targets - Ukraine and Lithuania
www.mtb.ua
accordbank.com.ua
www.adrem.lt
credit-agricole.ua
online.credit-agricole.ua
corpexpreprod.credit-agricole.ua
capluspro.credit-agricole.ua
premium.credit-agricole.ua
cabinet.credit-agricole.ua
www.pravex.com.ua
online.pravex.ua
www.lietuvoskeliai.lt
www.bite.lt
mano.bite.lt
www.cgates.lt
init.lt
www.balticum.lt
www.compensa.lt
www.if.lt
www.bta.lt
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_14_3pm.txt
Today's #NoName targets - United Kingdom, Germany and France.
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_15_2pm.txt
#NoName have added www.bundesfinanzministerium.de to their target list. It didn't take the site offline.
Config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_15_3pm.txt
#NoName didn't like Germany today.
www.deutschebahn.com
deutschlandticket.de
www.nordwestbahn.de
www.bundeskanzler.de
www.bmz.de
www.bundesfinanzministerium.de
www.afs-bund.de
www.mvg.de
www.rmv.de
www.vgn.de
www.spd.de
abo.bahn.de
www.bvl.de
www.dslv.org
www.dachser.com
www.bafin.de
portal.mvp.bafin.de
www.dbschenker.com
www.hellmann.com
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_16_8pm.txt
@GossiTheDog - Hope you don't mind me leveraging your excellent work in this threat to share some work of my coworkers.
My colleagues at #NETSCOUT had a blog post in the pipeline that was just published today on the modus operandi of #NoName057 and their #DDoS attack patterns.
It's that time of the day.. time to find out what #NoName tried to do!
Today, with the protection of Latvia, they DDoS'd Czech, Sweden and Belgium.
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_17_6pm.txt
@GossiTheDog hammering fereienshop.davos.ch.. yeah, that's really going to hurt the WEF :/
#NoName targets today - Estonia and Switzerland
myyk.inges.ee
marketplace.e-resident.gov.ee
epp.energia.ee
www.tallinn.ee
www.nordica.ee
www.sob.ch
www.post.ch
www.gva.ch
airport-grenchen.ch
www.bernairport.ch
engadin-airport.ch
peoples.ch
www.geneve.com
www.stadt-zuerich.ch
www.myswitzerland.com
www.postauto.ch
www.zvv.ch
www.mnt.ee
pilet.ee
lengmatta-davos.ch
alpenhof-davos.ch
www.davos-pischa.ch
europe-davos.ch
kajakallas.ee
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_18_11am.txt
#NoName DDoS targets today, Ukraine and Switzerland
cvp.tax.gov.ua
kyiv.tax.gov.ua
tax.gov.ua
wvp.tax.gov.ua
www.vtg.admin.ch
www.swisshelicopter.ch
www.bs.ch
ekonto.egov.bs.ch
www.lausanne.ch
www.montreux.ch
www.stadt.sg.ch
www.bellinzona.ch
www.stadt-schaffhausen.ch
www.swissprivatebankers.com
www.juliusbaer.com
www.swissbanking.ch
www.geneve-finance.ch
www.nw.ch
www.stans.ch
www.buochs.ch
zir.tax.gov.ua
map.tax.gov.ua
ca.tax.gov.ua
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_19_3pm.txt
Fs in the chat.
#NoName's botnet is offline as their C2 server down.
They have published a new version of the client, and require all the users (about 10k) to redownload and reinstall - as such, their DDoS effectiveness will suck for a while.
New C2 server is 94.140.115.64 on port 80 - same ISP as before, Nano.lv in Latvia.
New #NoName #Ddosia client file hashes and C2: https://pastebin.com/qeQCm74V
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_19_9pm.txt
#NoName are offline again. #threatintel
#NoName have put out DDoS claims just now.. but you may notice the links are taken from 7am UTC, before their C2 server died.
No botnet config dump as it’s offline.
New #NoName DDoS client details and C2 server: https://pastebin.com/psKHZzVs
IP is 94.131.97.202 and hardcoded into client again - ISP https://stark-industries.solutions/
They have only a fraction of hosts checking in so far, let's nuke from orbit. #threatintel
#NoName DDoS targets - France and Lithuania
www.adrem.lt
www.credit-agricole.com
eurolines.fr
www.star.fr
www.lignesdazur.com
www.lietuvoskeliai.lt
www.bite.lt
mano.bite.lt
www.cgates.lt
init.lt
www.balticum.lt
www.compensa.lt
www.if.lt
www.bta.lt
auth-aode.edf.fr
www.orano.group
www.enercoop.fr
mon-espace.enercoop.fr
C2 server: 94.131.97.202 (Czech)
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_20_3pm.txt
@GossiTheDog not a fan of 'stark industries' abuse reporting notice for their ASN.. "The contents of your abuse email will be forwarded directly on to our client for handling."
#NoName DDoS targets - UK and Netherlands
pa.eastcambs.gov.uk
politics.leics.gov.uk
www.liverpool.gov.uk
over.gvb.nl
www.cranbrooktowncouncil.gov.uk
www.ov-chipkaart.nl
login.ov-chipkaart.nl
www.bngbank.nl
services.belastingdienst.nl
my.swiftcard.org.uk
ukfinanceproducationb2c.b2clogin.com
www.moneyhelper.org.uk
9292.nl
a-bike.nl
www.justice.gov.uk
www.cbi.org.uk
C2 server: 94.131.97.202 (UK front company, Czech location)
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_21_11am.txt
Yes, #NoName can't even bring down Cranbook Town Council. One of the councillors replied to me on Mastodon just after Xmas and got their config DDoS proofed 🙌
In a sign that imposing cost on 'hacktivist' DDoS groups work - not a single one of the sites are offline.
@GossiTheDog but who spelled it "producation"
How #NoName manipulate their audience (and probably bosses) - they post photoshopped screenshots of outages, and have links to check-host.net - which always show sites down.
E.g. I've attached the report for liverpool.gov.uk just now, which shows as down - but it's actually available.
The net effect is an audience of tens of thousands on Telegram cheering on nothing.
@GossiTheDog Well Cranbrook also moved the source site to a different server since the attack was the origin server so the initial effort (again nothing to do with me, not my responsibility) was to try and just shove CF in front. So I guess the where to attack is also static based on a DNS lookup done some time previous. Presumably they’re still trying to hit the original source IP (Zen)?
@GossiTheDog bizarre. Wonder why they don’t even try and update and make any effort.
@GossiTheDog is check-host.net designed to always show as down?
@GossiTheDog is this an old list? they seem to kicking the pa (assume idox) server in Cambridge a few times.
@ryanc @GossiTheDog No, it works just fine.
I don't know why it shows "timed out" errors for them but they are definitely using it incorrectly, LOL.
They are using the "HTTP" button which, for an HTTPS site, will show "301 Moved Permanently" error (well, at least if the site is properly configured).
They should be using the "TCP Port" button which will try to access the site over port 443.
That said, I don't know why it times out on the e.g., Liverpool government site. I tested it on our Lab's site and it connected just fine.
@GossiTheDog BTW, www.liverpool.gov.uk is definitely not reachable from here right now - neither via HTTP, nor via HTTPS.
Maybe they have started filtering foreign IPs?
About that Romania attack #NoName #threatintel
(Cont) #NoName #threatintel
#NoName DDoS targets for today, Romania.
New client info: https://pastebin.com/6xHh4n8B
New C2: 193.233.193.240 (Huize Telecom in Hong Kong)
dnsc.ro
gov.ro
www.presidency.ro
www.mae.ro
www.mapn.ro
www.cdep.ro
sts.ro
www.senat.ro
www.mai.gov.ro
mmuncii.ro
www.olgutavasilescu.ro
www.baneasa-airport.ro
www.metrorex.ro
www.pmb.ro
www.mt.ro
www.mfinante.gov.ro
www.mdlpa.ro
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_22_10am.txt
#NoName DDoS targets for today, Romania again.
New client again, info: https://pastebin.com/Ukckmgf8
New C2: 89.105.201.91 (Novoserve)
gov.ro
www.presidency.ro
www.mae.ro
sts.ro
mmuncii.ro
www.bnro.ro
www.bvb.ro
www.scj.ro
www.ccr.ro
www.just.ro
mobile.telekom.ro
www.gts.ro
www.orange.ro
www.petrom.ro
www.omvpetrom.com
www.kmginternational.com
www.rompetrol.com
www.omv.ro
molromania.ro
www.roviniete.ro
#NoName 🤔
New #NoName client
First version crashed on start
New C2: 5.44.42.29 (GIR Network)
#NoName DDoS targets for today, Poland. Only one site is offline due to disrupted capability.
C2: 5.44.42.29 (GIR Network)
www.skm.pkp.pl
epuap.gov.pl
metro.waw.pl
www.sejm.gov.pl
www.prezydent.pl
www.sn.pl
www.senat.gov.pl
polskieradio24.pl
banie.pl
pyrzyce.um.gov.pl
www.mysliborz.pl
kozielice.pl
lipiany.pl
trzcinsko-zdroj.pl
przelewice.pl
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_24_10am.txt
#NoName DDoS targets for today, France and Finland.
C2: 5.44.42.29 (GIR Network)
valtioneuvosto.fi
eureennormandie.fr
www.aude.fr
www.laregion.fr
www.bordeaux.fr
www.haute-saone.gouv.fr
www.poitiers.fr
www.vienne.gouv.fr
www.lehavre.fr
www.igares.com
www.gers.gouv.fr
vaalit.fi
www.finlex.fi
www.otakantaa.fi
www.aanestyspaikat.fi
www.pekkahaavisto.com
haavisto2024.fi
www.alexstubb.fi
ollirehn2024.fi
www.aaltola2024.fi
liandersson.fi
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_25_6pm.txt
New #NoName #Ddosia client file hashes and C2: https://pastebin.com/WJaM0xyE #threatintel
#NoName DDoS targets for today, Finland.
C2: 195.35.19.138 (Hostinger)
supo.fi
www.eduskunta.fi
www.op.fi
www.suomenpankki.fi
www.tilastokeskus.fi
helsinki.chamber.fi
kauppakamari.fi
arbitration.fi
paaomasijoittajat.fi
www.finlex.fi
www.otakantaa.fi
www.nouvelle-aquitaine.fr
www.le64.fr
www.landes.fr
www.pau.fr
www.haute-garonne.fr
www.hautespyrenees.fr
metropole.toulouse.fr
www.tarbes.fr
www.tarn.gouv.fr
www.fine.fi
www.finanssiala.fi
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_26_6pm.txt
#NoName DDoS targets for today, Germany.
C2: 195.35.19.138 (Hostinger, Brazil)
www.bzst.de
www.nordwestbahn.de
polizei.thueringen.de
www.polizei-nds.de
tca.holding.talanx.com
e-accounting.talanx.com
www.hamburger-feuerkasse.de
www.zoll.de
www.afs-bund.de
www.mvg.de
www.rmv.de
www.vgn.de
www.balm.bund.de
frankfurt.de
www.dortmund.de
www.bremen.de
www.darmstadt.de
www.rostock.de
www.bielefeld.de
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_27_3pm.txt
#NoName DDoS targets for today, Ukraine and Finland.
C2: 195.35.19.138 (Hostinger, Brazil)
As part of "NATIONAL DEFENCE HACKATHON" alongside groups 22С, SKILLNET, CyberDragon, Federal Legion, People's Cyber Army, PHOENIX.
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_28_11am.txt
@GossiTheDog Is this the same group that also goes by NoName057(16)
@GossiTheDog how effective is this group? Last time they targeted www.mvg.de I asked my kid who lives in Munich to see if the website was down and the answer was no.
#NoName DDoS targets for today, Ukraine.
New C2: 185.255.123.84 (tinhat.se, physically in Nigeria)
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_29_1pm.txt
#NoName DDoS targets for today, Netherlands and Greece.
New C2: 185.255.123.84 (tinhat.se, physically in Nigeria)
www.gvb.nl
www.government.nl
www.rijksoverheid.nl
www.houseofrepresentatives.nl
www.portofamsterdam.com
www.groningen-seaports.com
www.thpa.gr
www.ov-chipkaart.nl
login.ov-chipkaart.nl
www.maa.nl
www.lelystadairport.nl
www.rijkswaterstaat.nl
www.vlaardingen.nl
www.yme.gr
ministryofjustice.gr
www.cecl.gr
www.aia.gr
www.minoan.gr
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_30_9pm.txt
#NoName DDoS targets for today, Finland (they're DDoS'ing Tietoevry, who are currently dealing with a ransomware incident), Lithuania and Germany
C2: 185.255.123.84 (tinhat.se, physically in Nigeria)
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_01_31_5pm.txt
@GossiTheDog Hi. Is there a way to automate the extraction of the config for ddosia project ? And also, is there a telegram group from which i can the latest version of their software ?
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/dedcb8c68218782a735394f366d58658
New #NoName #Ddosia client file hashes and C2: https://gist.github.com/GossiTheDog/9905962545501d00cd313ff91ea8d5a3
#NoName DDoS targets for today, Finland.
New C2: 188.116.20.254 - ROKO Networks Ltd - abuse@iroko.net
www.kyberturvallisuuskeskus.fi
www.op.fi
www.suomenpankki.fi
kauppakamari.fi
www.hel.fi
oikeus.fi
www.kuntaliitto.fi
www.kuluttajariita.fi
www.patriagroup.com
www.insta.fi
millog.fi
securemail.millog.fi
akerarctic.fi
www.unikie.com
odoo15.unikie.com
people.unikie.com
support.unikie.com
www.espoo.fi
www.vantaa.fi
www.turku.fi
www.tampere.fi
New #NoName #Ddosia client file hashes and C2: https://gist.github.com/GossiTheDog/9137ecd51ad3b26f4a37dc7c80848bbc
#NoName DDoS targets for today, Finland again
New C2: 45.89.55.4 - Stark Industries Solutions
www.traficom.fi
extidpevaluointi.traficom.fi
arbitration.fi
energia.fi
www.tek.fi
www.businessfinland.fi
www.fine.fi
www.finanssiala.fi
www.jyvaskyla.fi
www.kuopio.fi
www.pori.fi
www.lappeenranta.fi
www.vaasa.fi
www.kotka.fi
www.porvoo.fi
www.lahti.fi
www.danskebank.fi
www.handelsbanken.fi
www.saastopankki.fi
www.ombudsman.fi
www.forex.fi
ek.fi
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_02_4pm.txt
Sunday overtime at NoName due to disruption.
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/e3360ed34b57d377b40dc2fba7f689a5
#NoName DDoS targets for today, France.
New C2: 193.233.193.90 -huize.asia, Hong Kong
www.bourgognefranchecomte.fr
www.normandie.fr
www.grandest.fr
www.insee.fr
www.iledefrance.fr
www.paysdelaloire.fr
www.isula.corsica
www.auvergnerhonealpes.fr
www.bretagne.bzh
www.regionguadeloupe.fr
www.hautsdefrance.fr
regionreunion.com
www.maregionsud.fr
www.ctguyane.fr
Botnet config:
https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_04_11pm.txt
#NoName DDoS targets, Spain
C2: 193.233.193.90 -huize.asia, Hong Kong
sede.agenciatributaria.gob.es
www.lamoncloa.gob.es
www.cert.fnmt.es
www.tribunalconstitucional.es
www.bde.es
www.metrovalencia.es
www.policia.es
www.interior.gob.es
www.granada.org
metropolitanogranada.es
administracion.gob.es
www.incibe.es
www.ccn.cni.es
www.transportepublico.es
www.balearia.com
grupooesia.com
www.babelgroup.com
www.oneseq.es
s2grupo.es
unitel-tc.com
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_05.txt
#NoName claim to have taken down the Spanish navy and airforce (lol) and their proof is check-host links to a ping request (lol). Both sites are online. Ddosia is not.
This is part of a common theme where they try to use the ping and traceroute option to try to prove a site is offline, to mislead people.
#threatintel
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/e56ffe64b9ecdbbc51d33d9e4bf67869
Russian branded version has been mothballed.
#NoName DDoS targets, Spain
New C2 185.234.66.126 - pq.hosting, Netherlands
www.mapa.gob.es
amaco.es
armada.defensa.gob.es
ejercitodelaire.defensa.gob.es
www.asambleamurcia.es
www.oepm.es
parlamentodenavarra.es
www.jgpa.es
www.euskadi.eus
www.legebiltzarra.eus
www.gobiernodecanarias.org
www.parcan.es
www.carm.es
scpc.gov.ua
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_06_1pm.txt
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/6988b27da07e9d8ec1ca6bec5d06033a
Russian branded version is back.
No, this isn't nor was it ever running on toothbrushes.
#NoName DDoS targets, Spain
New C2 45.136.199.235 - IROKO Networks, Romania
www.cimsa.com
www.jomipsa.com
www.fecsa.net
www.aecid.es
www.amec.es
www.alimentacion.es
www.tussam.es
www.metro-sevilla.es
www.emtmalaga.es
www.vitrasa.es
alicante.vectalia.es
www.tgcomes.es
titsa.com
www.bilbao.eus
www.metrobilbao.eus
www.emtpalma.cat
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_07_4pm.txt
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/27e65024c71a94f1a06913b8fe74c9fd
#NoName DDoS targets, Spain again
New C2 83.217.9.33 - iptk.ru, Turkey
www.sedigas.es
www.camaramadrid.es
tab.es
www.cofides.es
www.aecarretera.com
www.tranviasdezaragoza.es
www.vitoria-gasteiz.org
metrotenerife.com
www.valenciaport.com
www.portdebarcelona.cat
www.bilbaoport.eus
www.apba.es
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_08_10am.txt
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/9243528c7055b4b2d05e5daa9d03a83c
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/56673d225f9d91f68cf68666084e3c2f
(Yes, they're on their 3rd new client today alone)
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/f8cbf0039b5463851f61009cea377f20
Yes, they're on their fourth client update today as all their nodes keep getting lost :(
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/f1079fe5486b2e7ac61d2e069caa67d4
#NoName DDoS targets, Spain again
New C2 185.234.66.239 - pq.hosting
www.ineco.com
cornelia.apc.es
www.parlament.cat
www.apvigo.es
www.asambleamadrid.es
www.juntadeandalucia.es
www.puertomalaga.com
www.portsdebalears.com
www.apcoruna.com
www.portcastello.com
www.huelvaport.com
www.mapfre.es
www.occident.com
www.reale.es
www.axa.es
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_09_2pm.txt
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/25a3ad28b6dcd9849619487c718242a0
#NoName DDoS targets, Spain again
New C2 77.75.230.221 - Stark Industries Solutions (PQ Hosting using a shit shell company in London)
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_10_2pm.txt
@GossiTheDog how do you know it's a shell company for PQ?
#NoName DDoS targets, Spain again
C2 77.75.230.221 - Stark Industries Solutions (PQ Hosting)
www.cimsa.com
www.fecsa.net
www.aecid.es
www.tussam.es
www.emtmalaga.es
www.vitrasa.es
alicante.vectalia.es
www.tgcomes.es
www.camaramadrid.es
titsa.com
www.aecarretera.com
www.bilbao.eus
www.emtpalma.cat
www.tranviasdezaragoza.es
www.vitoria-gasteiz.org
metrotenerife.com
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_11_6pm.txt
@GossiTheDog Quick newb question - how do you get those configs? Do you provide a honeypot which is part of the network?
I don't know why #NoName have done a week of attacks on Spain, normally they swap countries each day. They claim on Telegram it's in support of Spanish farmers, but.. uh.. I dunno how that benefits their stated goal of supporting Russia. Also they claimed people were running their DDoS from toothbrushes this week, soooo.
It probably doesn't help that many of the targets after 5th February appear to have no cloud WAF, so fall to DDoS really easily.
@GossiTheDog So you've extracted the config URL from the actual binaries? Out of curiosity, do they expect any special HTTP headers?
It’s likely Italy - they started DDoSing targets there last night. #NoName
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/830760f71dd3f2d410f07662d2c4be8f
#NoName DDoS targets, Italy
C2 193.233.193.65 - Lethost in Austria
www.bper.it
www.bologna-airport.it
www.camera.it
www.atm.it
accesso-privati.credem.it
www.borsaitaliana.it
www.bccroma.it
www.bicipa.it
www.anm.it
alfabeto.fideuram.it
www.ansa.it
www.camera-arbitrale.it
richiestamodifiche.adm.gov.it
iampe.adm.gov.it
telematico.adm.gov.it
stdru.adm.gov.it
concorsi.gdf.gov.it
www.gdf.gov.it
www.consob.it
www.aiaf.it
www.assosim.it
www.agcm.it
anasf.it
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_12_11am.txt
@GossiTheDog Thank you for all the updates. Can anyone explain me why they are struggeling that much? I missed a few weeks of infosec.
@GossiTheDog A C2 in Austria would certainly get my attention, but I can't link 193.233.193.65 to our country.
#NoName DDoS targets, Italy again.
They're having an Italy week, using the farmers to piggy back on again.
C2 193.233.193.65 - HUIZE TELECOM
www.giorgiameloni.it
www.sinfomar.it
www.amat.pa.it
amat.cloud.eleagol.it
www.amt.genova.it
www.sienamobilita.it
www.gtt.to.it
www.ctmcagliari.it
www.anm.it
intra.anm.it
www.trentinotrasporti.it
www.atb.bergamo.it
group.intesasanpaolo.com
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_13_10am.txt
#NoName DDoS targets, Italy again.
C2 193.233.193.65 - HUIZE TELECOM
iampe.agenziaentrate.gov.it
www.poste.it
www.mediobanca.com
www.popso.it
www.port.venice.it
www.agenziaentrate.gov.it
www.spid.gov.it
www.gruppomps.it
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_14_11am.txt
Reality vs Fantasy
Again abusing being unable to ping a target as proof a website is down. Most orgs block ping, they will know this.
@GossiTheDog I’ve seen you reporting on NoName for what seems like weeks now, if these chucklefucks are as inept as they seem, are they disruptive enough to follow so closely? (To be clear this isn’t meant as sarcasm or judgement I’m legit curious.)
@GossiTheDog That makes a lot more sense. Unfortunate that it gets reported like that, the group must love all the (undeserved) attention.
#NoName DDoS targets, Japan
New C2 193.17.183.18
www.panasonic.com
www.hkd.meti.go.jp
essales.tw.panasonic.com
www.enecho.meti.go.jp
www.chusho.meti.go.jp
holdings.panasonic
globalresearch.mizuho-sc.com
www.mod.go.jp
www.meti.go.jp
www.cao.go.jp
www.esri.cao.go.jp
www.shugiin.go.jp
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_19_11am.txt
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/8a25337bd994ded7096445c57efdd868
#NoName DDoS targets - why not have 5 countries.
New C2 5.252.23.100 - fake London VPS company again
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_20_12pm.txt
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/dd1cd434b55f0a7d974aad3bd73a564a
New #NoName #Ddosia client file hashes and C2:
https://gist.github.com/GossiTheDog/82319e4ee354c4376c092798e7b8e94c
#NoName DDoS targets, Ukraine and Japan. 2 year war anniversary.
New C2 38.180.101.98
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_22_11am.txt
I stopped #NoName monitoring and disruption over a week ago as I’ve been too busy.
I’ve just noticed from telegram they don’t appear to have had a public client since Friday, apparently somebody else has been taking down their C2 servers. Good.
#NoName DDoS targets, Demark
www.moviatrafik.dk
dinoffentligetransport.dk
www.cph.dk
www.kk.dk
aarhus.dk
www.billund.dk
www.aalborg.dk
www.odense.dk
www.randers.dk
www.vejle.dk
www.roskilde.dk
www.helsingor.dk
horsens.dk
api.cph.dk
www.mitid.dk
netbutik.postnord.dk
logistics.postnord.dk
www.vadehavskysten.dk
Botnet config: https://github.com/GossiTheDog/Monitoring/tree/main/NoName
#NoName DDoS targets, Denmark again.
www.toldst.dk
www.moviatrafik.dk
dinoffentligetransport.dk
ufst.dk
www.bornholms-lufthavn.dk
www.trm.dk
www.cph.dk
www.bane.dk
motorst.dk
gaeldst.dk
vurdst.dk
api.cph.dk
www.mitid.dk
danishshipping.dk
netbutik.postnord.dk
logistics.postnord.dk
www.kolding.dk
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_03_02_11am.txt
#NoName DDoS targets, Denmark again. Essentially same targets but they've refined the DDoS config.
C2 193.17.183.123
www.toldst.dk
www.moviatrafik.dk
dinoffentligetransport.dk
ufst.dk
www.bornholms-lufthavn.dk
www.trm.dk
www.cph.dk
motorst.dk
gaeldst.dk
vurdst.dk
api.cph.dk
danishshipping.dk
netbutik.postnord.dk
logistics.postnord.dk
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_03_03_11am.txt
@GossiTheDog s***... gonna tell my Danish friends that websites they never access are gonna be down
#NoName DDoS targets, this week they are "supporting the farmers" (lol) in Poland.
C2 193.17.183.123
pz.gov.pl
etoll.gov.pl
drogi.gddkia.gov.pl
kpd.gddkia.gov.pl
www.autostrada-a2.pl
flotis.pl
www.autostrada-a4.com.pl
enota.viatoll.pl
conadrogach.pl
a1.com.pl
Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_03_04_10am.txt
You can follow @NoName57Bot for real time #NoName updates if you don’t want to wait for me. #threatintel
NoName's DDoSia platform has been deleted from Telegram. The chat channels, support channels, client downloads, documentation and tasking bot have all been shut down.
The last public version of the Ddosia client is also disconnected from users.
The non-public C2, 193.17.183.123, is still online at present.
#threatintel
#NoName have moved Ddosia to a new Telegram group with a new bot.
Today they’re mostly attacking France. Botnet config: https://witha.name/data/2024-03-11_13-45-06_DDoSia-target-list-full.json
#NoName currently trying to DDoS http://landopensystems.mod.gov.uk/
Unsuccessfully I might add.
@GossiTheDog Is it possible to get an updated list for the current #NoName targets please?
Noname are trying to target the UK right now. Unsuccessfully I might add. Current targets include Electoral Commission #NoName #threatintel
And there’s the poor translated announcement out. #NoName #threatintel
Police have arrested two people in Spain over allegedly being part of NoName.
Details are unclear - I guess it might have been people running the NoName Ddosia client in their home PCs.
https://www.reuters.com/technology/cybersecurity/three-pro-russian-hackers-arrested-spain-over-cyberattacks-2024-07-20/
#NoName #threatintel
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.