Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months

Posted on July 24, 2025July 24, 2025 By CWS

The professional-Russian hacktivist group NoName057(16) has orchestrated an enormous distributed denial-of-service marketing campaign focusing on over 3,700 distinctive hosts throughout 13 months, in accordance with new analysis printed on July 22, 2025.

The group, which emerged in March 2022 shortly after Russia’s full-scale invasion of Ukraine, has maintained an unprecedented operational tempo by launching assaults in opposition to a median of fifty distinctive hosts every day, with exercise peaking at 91 targets in a single day.

The hacktivists primarily targeted their assault on authorities and public-sector entities in European nations opposing Russia’s invasion of Ukraine, with Ukrainian organizations comprising the most important share of targets at 29.47%, adopted by France (6.09%), Italy (5.39%), and Sweden (5.29%).

The marketing campaign demonstrates clear strategic alignment with Russian geopolitical pursuits, functioning as an unofficial cyber warfare asset that frames assaults as direct retaliation for actions taken by Russia’s adversaries.

DDoSia C2 communication circulate (Supply – Recorded Future)

Recorded Future analysts recognized the group’s main weapon as a customized DDoS device named “DDoSia,” the successor to an earlier botnet known as Bobik.

The device facilitates application-layer DDoS assaults by overwhelming goal web sites with excessive volumes of junk requests, working by means of a volunteer-driven mannequin that recruits contributors through Telegram channels and rewards contributors with cryptocurrency.

Technical Infrastructure and Communication Protocol

The DDoSia malware employs a complicated two-step communication course of with shopper registration begins with an HTTP POST request to the /shopper/login endpoint, the place the malware validates authenticity utilizing encrypted payloads secured with AES-GCM encryption.

The encryption key’s dynamically generated utilizing a mixture of the Consumer Hash and Shopper ID, creating a strong authentication mechanism.

The malware’s multi-tiered infrastructure consists of quickly rotating Tier 1 command-and-control servers with a median lifespan of 9 days, completely permitted to determine connections to Tier 2 servers protected by entry management lists.

This structure ensures operational resilience whereas sustaining dependable C2 performance even beneath regulation enforcement stress, as demonstrated throughout Operation Eastwood between July 14-17, 2025, which resulted in arrests and searches throughout six European international locations.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attacked, Devices, Hackers, Months, NoName05716s, Thirteen, Unique

Post navigation

Previous Post: HeroDevs Raises $125 Million to Secure Deprecated OSS
Next Post: Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices

Related Posts

Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News
New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands Cyber Security News
How to Stay Ahead of Vulnerabilities Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News
CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News