HomeRisk ManagementsHacktivist Group NoName057(16) Targets European Entities

Hacktivist Group NoName057(16) Targets European Entities

Published on

spot_img
Hacktivist Group NoName057(16) Targets European Entities

The cyber threat actor known as NoName057(16) has been observed adjusting their strategies in response to the escalating tensions between Ukraine and Russia. This group has made a name for themselves through Project DDoSia, a campaign aimed at carrying out large-scale distributed denial-of-service (DDoS) attacks against entities supporting Ukraine, particularly NATO member states.

Sekoia.io, a cybersecurity monitoring platform, has been closely monitoring the command-and-control (C2) infrastructure of the DDoS tool used by NoName057(16). They have noticed significant improvements in the software shared by the group, such as updates that improve compatibility with various processor architectures and operating systems. In a recent advisory released by security experts, it was revealed that the group has even created customized versions of the software based on the geographical location of users, with specific guidance for Russian users to utilize a VPN.

The latest version of the DDoSia software has introduced advanced encryption methods for data transmission between users and their C2 servers, demonstrating a constant evolution towards more sophisticated techniques. Despite these advancements, the group has encountered challenges in maintaining the stability of its C2 servers, leading to frequent changes and diversification of hosting locations globally.

Analysis of the group’s target selection has shown a consistent focus on European entities, with Ukraine being the primary target due to the ongoing geopolitical tensions. Other countries like Finland and Italy have also experienced significant impacts, likely due to their NATO affiliations and support for Ukraine. The actions of NoName057(16) appear to be closely tied to geopolitical events, as indicated by targeted attacks coinciding with international developments.

A large number of the affected entities belong to government-related sectors, indicating a strategic effort to influence governmental policies. Furthermore, the transportation and banking sectors have also been targeted, possibly due to their economic importance or political relevance.

Despite facing disruptions to their infrastructure and making frequent software changes, NoName057(16) continues to expand their influence and reach. They have seen an increase in membership and collaboration with other hacktivist groups, emphasizing their growing presence in the cybersecurity landscape. Sekoia.io predicts further advancements and updates from DDoSia in the near future, underscoring the ongoing threat posed by such entities in cyberspace.

Overall, the evolving tactics of NoName057(16) highlight the adaptability and persistence of cyber threat actors in the face of geopolitical conflicts, posing a significant challenge for cybersecurity professionals and organizations worldwide.

Source link

Latest articles

Three individuals arrested for facilitating criminal activities by providing bank accounts, Cybercrime Branch Officers reveal

Three men from Bikaner were arrested by the Cybercrime branch officers in Ahmedabad for...

Losses from CrowdStrike outage reach $5.4 billion

The fallout from the CrowdStrike Falcon outage continues to have a significant impact on...

Security at risk: Leaked key and faulty practices leave 900 PC/server models vulnerable to exploitation

The recent discovery of leaked test keys in computer and server motherboard firmware has...

Ketchikan Borough recovers $625k stolen by email hacker

The Ketchikan Gateway Borough has recently made a significant recovery after falling victim to...

More like this

Three individuals arrested for facilitating criminal activities by providing bank accounts, Cybercrime Branch Officers reveal

Three men from Bikaner were arrested by the Cybercrime branch officers in Ahmedabad for...

Losses from CrowdStrike outage reach $5.4 billion

The fallout from the CrowdStrike Falcon outage continues to have a significant impact on...

Security at risk: Leaked key and faulty practices leave 900 PC/server models vulnerable to exploitation

The recent discovery of leaked test keys in computer and server motherboard firmware has...
en_USEnglish