NoName057(16)February 08, 2023
This document (instruction) is intended to describe the launch of special software (hereinafter referred to as the “client”) to help the NoName057(16) team in conducting DDoS attacks on the sites of countries unfriendly to Russia.
The DDosia Project is a voluntary project and is a network of volunteer devices from several thousand computers on which they personally installed our client, and each time it is launched, they increase the power of influence on the targets selected by the NoName057(16) team (websites of countries unfriendly to the Russian Federation).
Necessary actions to participate in the project:
1) Start the @DDosia_bot Telegram bot with the /start command
2) Go through the registration procedure in the bot, in the absence of a cryptocurrency wallet, select the “Stay anonymous hero” option. All data – nickname and crypto wallet number can be changed later.
3) @DDosia_bot will give you client_id.txt and help.txt files.
4) Then you need to download the zip-archive with client versions for the main OS from the link indicated in our Telegram group .
5) Unpack the downloaded archive to any place on your hard drive. Select the folder with the client file for your OS from the unpacked archive.
5) Put the client_id.txt file, which is a unique ID number, into the folder with the downloaded client file. If the client_id.txt file is missing or if changes are made to it, the software will not work. If changes have been made or the file has been deleted, you must ask @DDosia_bot for a new one.
6) Install and run the VPN client to change the IP address.
7) It is advisable to disable the antivirus or add the folder with the client to its exclusions so that the antivirus does not conflict with our client.
8) Run the client file (by double clicking on the client icon in the folder) with administrator rights.
9) On the screen that the client will give, among others, the message “targets received: %number%” will appear.
10) Within a few minutes, messages will begin to appear about the number of total and successful requests. It is allowed to run several instances of our client, depending on the power of the computer. The best results were shown by the launch of 5-10 copies. Changing the region in a VPN often results in an increase in successful requests. Try to find the maximum values by sorting through the regions in your VPN client.
Below are frequently asked questions (FAQ):
1) The software does not start. What to do?
Go through all the steps above first, preferably more than once. If the problem persists, contact the technical support team (https://t.me/c/1228309110/34219)
2) Does the provider see my actions or law enforcement agencies see my IP?
If the computer is located in the territory of the Russian Federation, then even without using a VPN, it is extremely unlikely that there will be any problems with the law, since the software is designed for stress testing. At least we think so.
If the computer is located outside the territory of the Russian Federation, it is strongly recommended to use a VPN to change the IP address. You can check the IP address change, for example, on myip.com. It is recommended to watch the VPN activity to avoid disconnecting it, or use a VPN with the killswitch option.
3) Is it possible to get the source codes of the software and does it contain malicious code (trojans, etc.)?
If you wish, you can try to parse the code and make sure that there is no malicious code in the software. Many have already done this, with the same result. As far as we know, the analysis can be found in the public domain.
4) Then why do antivirus and virustotal consider it to be malicious?
Since our activities have already caused a wide resonance in the Western press, many anti-virus databases and virustotal have already been amended to prevent the distribution of our software.
5) Will I get paid?
Each user of our client will have to do two things:
🔹start @CryptoBot bot from your Telegram account (exactly from the one you registered in our @DDosiabot bot).
🔹get yourself a TON wallet (how to do it is written here (https://ton.org/en/wallets)) to be able to withdraw tokens from the built-in wallet in @CryptoBot
About the system of payment of remuneration to the participants of our project:
🔹payments are received by all those who launch our client, and not only TOP participants;
🔹The amount of payout depends on the number of SUCCESSFUL attacks;
🔹The results are summed up at the end of each day, after summarizing the payment will be received by all participants in the attacks for the current day;
🔹 The daily budget is limited to a certain amount, which is divided among all the clients that launched that day.
✅The payout distribution scheme will look like this:
🔸There is a total monthly budget (30 days) and a daily budget
🔸Payments will be made daily in TON
🔸 Payment for each active user is made in proportion to his participation in attacks according to the formula:
Number of successful user attacks per day: X
Number of all successful attacks by all participants: Y
Daily budget: SUM
Payment amount = X / Y * SUM
🔴The minimum payment amount at the time of payment is $1 (equivalent in tokens). If the payment amount is less than the minimum, then it flows over to the next day and is summed up with the current one (up to reaching the minimum payment, which will already be transferred to the user’s cryptobot).
PS: You can withdraw tokens to a bank card or other services using exchangers. They can be found here https://www.bestchange.ru/ton-to-sberbank.html
6) I want to offer other help, where should I write?
Questions about other assistance to the NoName057(16) team can be sent to email: 05716nnm@proton.me
7) Launch software on android:
Getting started: download Termux from the official GitHub or from F-Droid
Go to the @Ddosiabot bot, get your client_id.txt, go to the Ddosia Project channel, subsection “manuals and software”, download the d.zip archive from there (or newer, if there is one at the time of reading this manual)
After these manipulations, we go to Termux and open the application access to the phone’s storage (before that, Termux has access only to its environment, separated by Andoid, for security purposes, from the rest of the storage (where the files we need are stored)) using the termux- setup-storage (clickable, can be copied with one click)
After that, using any file manager, we make sure that the files are in the Telegram downloads folder, in my case it was (storage/emulated/0/Dowload/Telegram), in your case, depending on the skin (manufacturer’s UI, each has it your own) and version of Android, it may differ (or maybe due to the fact that you have a separate folder for downloads from tg)
Further, everything is even simpler – the reader just needs to copy the commands below, changing the path if it is different for him
Copy the archive with the client to the Termux environment: cp /storage/emulated/0/Download/Telegram/d.zip ./ (clickable, can be copied by clicking)
Copy the authorization file: cp /storage/emulated/0/Download/Telegram/client_id.txt ./ (can be copied by clicking)
Unzip the client: unzip d.zip
Then we write ./d_linux_arm
IMPORTANT!
You can’t just write d_linux_arm – so termux will not understand what they want from it, because this file is a script, and you need to run it with the command ./ (Yes, this is a command, not a zigzag dot that the author added for the sake of laughing)
IMPORTANT!!
If a new client is released, it is unlikely to be called the same as it is now (d.zip), and there may not be a new guide. In this case, all the commands in the guide that mentions d.zip need to be corrected, replacing the old name with the new one
Eng version:
Instructions for using DDosia software
This document (instruction) is intended to describe the launch of special software (hereinafter referred to as the “client”) to help the NoName057(16) team in conducting DDoS attacks on the sites of countries unfriendly to Russia.
The DDosia Project is a voluntary project and is a network of volunteer devices from several thousand computers on which they personally installed our client, and each time it is launched, they increase the power of influence on the targets selected by the NoName057(16) team (websites of countries unfriendly to the Russian Federation).
Necessary actions to participate in the project:
1) Start the @DDosia_bot Telegram bot with the /start command
2) Go through the registration procedure in the bot, in the absence of a cryptocurrency wallet, select the “Stay anonymous hero” option. All data – nickname and crypto wallet number can be changed later.
3) @DDosia_bot will give you client_id.txt and help.txt files.
4) Then you need to download the zip-archive with the client versions for the main OS from the link provided in our Telegram group.
5) Unpack the downloaded archive to any place on your hard drive. Select the folder with the client file for your OS from the unpacked archive.
5) Put the client_id.txt file, which is a unique ID number, into the folder with the downloaded client file. If the client_id.txt file is missing or if changes are made to it, the software will not work. If changes have been made or the file has been deleted, you must ask @DDosia_bot for a new one.
6) Install and run the VPN client to change the IP address.
7) It is advisable to disable the antivirus or add the folder with the client to its exclusions so that the antivirus does not conflict with our client.
8) Run the client file (by double clicking on the client icon in the folder) with administrator rights.
9) On the screen that the client will give, among others, the message “targets received: %number%” will appear.
10) Within a few minutes, messages will begin to appear about the number of total and successful requests. It is allowed to run several instances of our client, depending on the power of the computer. The best results were shown by launching 5-10 copies. Changing the region in a VPN often results in an increase in successful requests. Try to find the maximum values by sorting through the regions in your VPN client.
Below are frequently asked questions (FAQ):
1) The software does not start. What to do?
Go through all the steps above first, preferably more than once. If the problem persists, contact the technical support team (https://t.me/c/1228309110/34219)
2) Does the provider see my actions or law enforcement agencies see my IP?
If the computer is located in the territory of the Russian Federation, then even without using a VPN, it is extremely unlikely that there will be any problems with the law, since the software is designed for stress testing. At least we think so.
If the computer is located outside the territory of the Russian Federation, it is strongly recommended to use a VPN to change the IP address. You can check the IP address change, for example, on myip.com. It is recommended to watch the VPN activity to avoid disconnecting it, or use a VPN with the killswitch option.
3) Is it possible to get the source codes of the software and does it contain malicious code (trojans, etc.)?
If you wish, you can try to parse the code and make sure that there is no malicious code in the software. Many have already done this, with the same result. As far as we know, the analysis can be found in the public domain.
4) Then why do antivirus and Virustotal consider it malicious?
Since our activities have already caused a wide resonance in the Western press, many anti-virus databases and Virustotal have already been amended to prevent the distribution of our software.
5) Will I be paid?
We kindly ask you to consider the project as voluntary and non-binding. The payment of remuneration to the crypto-wallet to the most active participants of the project is made once a month, but you should not consider this as a salary in a certain date, and even more so to demand something. Issues related to the payment of remuneration are resolved on an individual basis. In the beginning of the day of payments we sum up and report on the results of the most active participants in our project.
6) I want to offer other help, how can I contact your team?
Questions about other assistance to the NoName057(16) team can be sent to e-mail: 05716nnm@proton.me
Report content on this page
