Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months

Posted on July 24, 2025July 24, 2025 By CWS

The professional-Russian hacktivist group NoName057(16) has orchestrated an enormous distributed denial-of-service marketing campaign focusing on over 3,700 distinctive hosts throughout 13 months, in accordance with new analysis printed on July 22, 2025.

The group, which emerged in March 2022 shortly after Russia’s full-scale invasion of Ukraine, has maintained an unprecedented operational tempo by launching assaults in opposition to a median of fifty distinctive hosts every day, with exercise peaking at 91 targets in a single day.

The hacktivists primarily targeted their assault on authorities and public-sector entities in European nations opposing Russia’s invasion of Ukraine, with Ukrainian organizations comprising the most important share of targets at 29.47%, adopted by France (6.09%), Italy (5.39%), and Sweden (5.29%).

The marketing campaign demonstrates clear strategic alignment with Russian geopolitical pursuits, functioning as an unofficial cyber warfare asset that frames assaults as direct retaliation for actions taken by Russia’s adversaries.

DDoSia C2 communication circulate (Supply – Recorded Future)

Recorded Future analysts recognized the group’s main weapon as a customized DDoS device named “DDoSia,” the successor to an earlier botnet known as Bobik.

The device facilitates application-layer DDoS assaults by overwhelming goal web sites with excessive volumes of junk requests, working by means of a volunteer-driven mannequin that recruits contributors through Telegram channels and rewards contributors with cryptocurrency.

Technical Infrastructure and Communication Protocol

The DDoSia malware employs a complicated two-step communication course of with shopper registration begins with an HTTP POST request to the /shopper/login endpoint, the place the malware validates authenticity utilizing encrypted payloads secured with AES-GCM encryption.

The encryption key’s dynamically generated utilizing a mixture of the Consumer Hash and Shopper ID, creating a strong authentication mechanism.

The malware’s multi-tiered infrastructure consists of quickly rotating Tier 1 command-and-control servers with a median lifespan of 9 days, completely permitted to determine connections to Tier 2 servers protected by entry management lists.

This structure ensures operational resilience whereas sustaining dependable C2 performance even beneath regulation enforcement stress, as demonstrated throughout Operation Eastwood between July 14-17, 2025, which resulted in arrests and searches throughout six European international locations.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attacked, Devices, Hackers, Months, NoName05716s, Thirteen, Unique

Post navigation

Previous Post: HeroDevs Raises $125 Million to Secure Deprecated OSS
Next Post: Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices

Related Posts

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
Hackers Stole Customer Data from Salesforce Instances Cyber Security News
AI-Powered Cybersecurity Tools Can Be Turned Against Themselves Through Prompt Injection Attacks Cyber Security News
50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint Cyber Security News
PolarEdge Botnet Infected 25,000+ Devices and 140 C2 Servers Exploiting IoT Vulnerabilities Cyber Security News
Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
  • Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign
  • New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
  • Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign
  • New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark