• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Pro-Russian Hacktivist Group Targets Czech Presidential Election

You are here: Home / General Cyber Security News / Pro-Russian Hacktivist Group Targets Czech Presidential Election
January 13, 2023

The pro-Russia hacktivist team identified as NoName057(16) has recently began new attacks from organizations and businesses across Poland, Lithuania and other countries. Most just lately, the group began targeting the websites of the Czech presidential election candidates.

In accordance to SentinelOne, who learned the new strategies, the group done these campaigns by applying general public Telegram channels, a dispersed denial of provider (DDoS) payment method driven by volunteers, a multi-OS supported toolkit and GitHub.

“The group has also made use of GitHub to host a assortment of illicit action,” wrote Tom Hegel, a senior risk researcher at SentinelOne.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This features applying GitHub Internet pages for freely hosting their DDoS instrument web-site […] and the linked GitHub repositories for hosting the newest model of their resources as marketed in the Telegram channel.”

In this regard, SentinelOne stated it described the abuse to the GitHub Belief & Protection crew, who took action and taken out the destructive accounts.

In conditions of motivations driving the NoName057(16) group, the security researchers established the hackers are largely focused on disrupting web sites of nations critical to Russia’s invasion of Ukraine.

“Initial attacks centered on Ukrainian information websites, although later on shifting to NATO-associated targets,” Hegel explained.

“For illustration, the initial disruption the group claimed responsibility for have been the March 2022 DDoS attacks on Ukraine information and media internet sites Zaxid, Fakty UA, and other people. Over-all the motivations middle all over silencing what the group deems to be anti-Russian.”

Hegel also clarified that, from a technological standpoint, NoName057(16) is not particularly subtle. Even now, the team can have an effect on assistance availability, even if generally small-lived.

“What this team signifies is an greater desire in volunteer-fueled attacks whilst now including in payments to its most impactful contributors,” added the security expert. “We count on these kinds of teams to carry on to thrive in today’s really contentious political local weather.”

A list of Indicators of Compromise (IoC) regarding NoName057(16) is obtainable in the SentinelOne advisory.

Its publication arrives days soon after security organization Lupovis revealed that separate groups of Russian hackers are using their presence inside the networks of corporations in several nations to start attacks towards Ukraine.


Some sections of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Russian Hackers Try to Bypass ChatGPT’s Restrictions For Malicious Purposes

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Pro-Russian Hacktivist Group Targets Czech Presidential Election
  • Russian Hackers Try to Bypass ChatGPT’s Restrictions For Malicious Purposes
  • Beware: Tainted VPNs Being Used to Spread EyeSpy Surveillanceware
  • Cisco Warns of Critical Vulnerability in End-of-Life Routers
  • Windows Defender update deletes Start Menu, Taskbar, Desktop shortcuts
  • Meta sues ‘data scraping for hire’ service that collected info on 600k users
  • Cybercriminals Using Polyglot Files in Malware Distribution to Fly Under the Radar
  • Royal Mail’s Attackers Linked to Russia-Backed LockBit
  • Euro Police Bust Multimillion-Dollar Crypto Fraud Gang
  • Illegal Crypto Transaction Volumes Hit All-Time High

Copyright © TheCyberSecurity.News, All Rights Reserved.