DDoS

Leak Wolf: Wolf hacktivists carried out attacks on more than 40 Russian companies

BI.ZONE conducted a study and found that 40 organizations in Russia became victims of the Leak Wolf group. Hacktivists hack companies and post stolen data on their Telegram channel. Interestingly, they do not use malware and disguise themselves as real employees, which makes them difficult for cybersecurity services to track down. According to the company, unlike other attackers, Leak Wolf does not pursue financial or espionage purposes. Their actions are motivated rather by "moral" motives.…

Read More

Instructions for using DDosia software

NoName057(16)February 08, 2023This document (instruction) is intended to describe the launch of special software (hereinafter referred to as the "client") to help the NoName057(16) team in conducting DDoS attacks on the sites of countries unfriendly to Russia.The DDosia Project is a voluntary project and is a network of volunteer devices from several thousand computers on which they personally installed our client, and each time it is launched, they increase the power of influence on the…

Read More

The Hacker Journal

In this issue we talk about: Browser-in-the-Middle, Car Hacking, Hack-for-hire, Spying via webcam, EVE-NG, Forensic analysis, Metasploitable3, IP cameras, Instagram, Show/hide password… We are seeing a rapid increase in the number of connected devices on the Net, from the smartphone to the smart home. This is good! But if on the one hand this brings advantages in terms of comfort and efficiency, on the other it opens up risks that we could not even imagine…

Read More

Network Nightmare

"Network Nightmare" Mindmap It is a mindmap for conducting network attacks. For the most part, it will be useful to pentesters or red team operators. Traffic Hijacking; MiTM Attacks; Dynamic IGP Routing; Configuration Exfiltration; DoS; NAC/802.1X Bypassing; GRE Pivoting; Cisco EEM for hiding user; Authentication Cracking; Information Gathering; Cisco Passwords; VLAN Bypassing. NetworkNightmare_by_CasterDownload

Read More

#Russians Offer New #Targets for … well, many things – Deloitte?

In their words: SECURITY 360 LLC: On November 24 - 25, we invite security officers, analysts, business intelligence officers, IT / information security specialists to the final conference-training "Corporate security'2022. Trends, problems and solutions". Two days of expert presentations, comprehensive analysis, open discussions and search for optimal solutions. All issues are considered in the context of the current geolithic and socio-economic situation. Deep problem-oriented reports, real cases. Each day of the conference is dedicated to…

Read More

Number of cyberattacks on Russia in 2022 increased by 80%

The number of cyberattacks on Russia in 2022 increased by 80%, 25 thousand fell on state resources - Chernyshenko “And of course, information security is at the forefront, because the number of cyber attacks on Russia has increased by 80% this year. Moreover, if last year the financial sector was the main target of cyberattacks, this year it is the public sector. 25,000 or even more cyber attacks on state resources and 1,200 incidents on…

Read More

Anonymous Russia DDoS Tool of Choice

As you may have noticed, we often use STRESSHIT in our attacks ⁃ Extensive functionality.⁃ The design is done at a professional level.⁃ Bypass « Qrator Labs, Cloudflare UAM • Captcha, DDOS-GUARD and more.⁃ There are no logs at all, there are only attack IDs for statistics.⁃ Cheap prices⁃ Layer 4 • Layer 7⁃ Job Stability⁃ Frequent updates⁃ Powerful dedicated servers https://cybershafarat.com/2022/09/11/cognitive-warfare-training-service/ My comment about it is very positive, so I am happy to recommend…

Read More