Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months

Posted on July 24, 2025July 24, 2025 By CWS

The professional-Russian hacktivist group NoName057(16) has orchestrated an enormous distributed denial-of-service marketing campaign focusing on over 3,700 distinctive hosts throughout 13 months, in accordance with new analysis printed on July 22, 2025.

The group, which emerged in March 2022 shortly after Russia’s full-scale invasion of Ukraine, has maintained an unprecedented operational tempo by launching assaults in opposition to a median of fifty distinctive hosts every day, with exercise peaking at 91 targets in a single day.

The hacktivists primarily targeted their assault on authorities and public-sector entities in European nations opposing Russia’s invasion of Ukraine, with Ukrainian organizations comprising the most important share of targets at 29.47%, adopted by France (6.09%), Italy (5.39%), and Sweden (5.29%).

The marketing campaign demonstrates clear strategic alignment with Russian geopolitical pursuits, functioning as an unofficial cyber warfare asset that frames assaults as direct retaliation for actions taken by Russia’s adversaries.

DDoSia C2 communication circulate (Supply – Recorded Future)

Recorded Future analysts recognized the group’s main weapon as a customized DDoS device named “DDoSia,” the successor to an earlier botnet known as Bobik.

The device facilitates application-layer DDoS assaults by overwhelming goal web sites with excessive volumes of junk requests, working by means of a volunteer-driven mannequin that recruits contributors through Telegram channels and rewards contributors with cryptocurrency.

Technical Infrastructure and Communication Protocol

The DDoSia malware employs a complicated two-step communication course of with shopper registration begins with an HTTP POST request to the /shopper/login endpoint, the place the malware validates authenticity utilizing encrypted payloads secured with AES-GCM encryption.

The encryption key’s dynamically generated utilizing a mixture of the Consumer Hash and Shopper ID, creating a strong authentication mechanism.

The malware’s multi-tiered infrastructure consists of quickly rotating Tier 1 command-and-control servers with a median lifespan of 9 days, completely permitted to determine connections to Tier 2 servers protected by entry management lists.

This structure ensures operational resilience whereas sustaining dependable C2 performance even beneath regulation enforcement stress, as demonstrated throughout Operation Eastwood between July 14-17, 2025, which resulted in arrests and searches throughout six European international locations.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attacked, Devices, Hackers, Months, NoName05716s, Thirteen, Unique

Post navigation

Previous Post: HeroDevs Raises $125 Million to Secure Deprecated OSS
Next Post: Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices

Related Posts

Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools Cyber Security News
New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection Cyber Security News
GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News