The pro-Russia hacktivist team identified as NoName057(16) has recently began new attacks from organizations and businesses across Poland, Lithuania and other countries. Most just lately, the group began targeting the websites of the Czech presidential election candidates.
In accordance to SentinelOne, who learned the new strategies, the group done these campaigns by applying general public Telegram channels, a dispersed denial of provider (DDoS) payment method driven by volunteers, a multi-OS supported toolkit and GitHub.
“The group has also made use of GitHub to host a assortment of illicit action,” wrote Tom Hegel, a senior risk researcher at SentinelOne.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“This features applying GitHub Internet pages for freely hosting their DDoS instrument web-site […] and the linked GitHub repositories for hosting the newest model of their resources as marketed in the Telegram channel.”
In this regard, SentinelOne stated it described the abuse to the GitHub Belief & Protection crew, who took action and taken out the destructive accounts.
In conditions of motivations driving the NoName057(16) group, the security researchers established the hackers are largely focused on disrupting web sites of nations critical to Russia’s invasion of Ukraine.
“Initial attacks centered on Ukrainian information websites, although later on shifting to NATO-associated targets,” Hegel explained.
“For illustration, the initial disruption the group claimed responsibility for have been the March 2022 DDoS attacks on Ukraine information and media internet sites Zaxid, Fakty UA, and other people. Over-all the motivations middle all over silencing what the group deems to be anti-Russian.”
Hegel also clarified that, from a technological standpoint, NoName057(16) is not particularly subtle. Even now, the team can have an effect on assistance availability, even if generally small-lived.
“What this team signifies is an greater desire in volunteer-fueled attacks whilst now including in payments to its most impactful contributors,” added the security expert. “We count on these kinds of teams to carry on to thrive in today’s really contentious political local weather.”
A list of Indicators of Compromise (IoC) regarding NoName057(16) is obtainable in the SentinelOne advisory.
Its publication arrives days soon after security organization Lupovis revealed that separate groups of Russian hackers are using their presence inside the networks of corporations in several nations to start attacks towards Ukraine.
Some sections of this article are sourced from:
www.infosecurity-magazine.com