0 0
Read Time:54 Second

In their words:

On your website, in the article https://xakep.ru/2022/10/14/ddosia/ it is stated: “Basically, DDOSIA participants attack targets set by the pro-Russian hack group KillNet. In particular, they took part in a recent large-scale DDoS attack on major airports in the United States”, referring to some “researchers”. We operate independently and have nothing to do with the KillNet hack group. We choose our own targets for DDOS attacks. Please edit the publication (https://t.me/xakep_ru/13062), otherwise it turns out ugly. And learn to separate flies from cutlets, in the end, you could ask the source. You are an old, respected magazine, not magazines for 3 rubles a pack Team NoName057(16)

Download the Treadstone 71 Report – July 13
Crowdsourced DDoS: DDOSIA pays volunteers to participate in attacksdiscovered the DDOSIA crowdsourcing DDoS project, in which a Russian-speaking hack group pays volunteers to participate in attacks on Western organizations. https://xakep.ru/2022/10/14/ddosia/

cc42c1089bb327ee5430e450172a3f1142fd0988

https://cybershafarat.com/2022/08/15/manifest-noname05716-to-be-released-aug-17/

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
100 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence