NoName057(16) is a pro-Russian hacktivist group conducting DDoS campaigns targeting Ukraine, NATO, and other entities, leveraging Telegram, a volunteer-driven DDoS program, and a GitHub-hosted toolkit. The group has impacted several sectors including government, finance, and critical infrastructure, with activity across Denmark, Poland, Lithuania, and the Czech Republic; their operations are publicly claimed on Telegram and supported by a multi-OS toolset and online presence. #NoName05716 #DDOSIA
Keypoints
- Pro-Russia hacktivist group NoName057(16) conducts DDoS campaigns against Ukraine and NATO organizations, including government and critical infrastructure targets.
- Recent disruptions affected Denmark’s financial sector, with past actions seen in Poland, Lithuania, and other targets; January 2023 saw Czech election candidate websites targeted.
- The group operates via Telegram to claim attacks, mock targets, and educate followers, maintaining active, though waning, engagement.
- GitHub is used to host tools and distribution sites (e.g., dddosia.github.io) with profiles such as dddosia and kintechi341; GitHub Trust & Safety intervened to remove related content.
- C2 and tooling infrastructure rely on providers like Neterra and No-IP; current C2: zig35m48zur14nel40[.]myftp.org at 31.13.195.87.
- The NoName057(16) attack toolkit, DDOSIA, includes Python and Golang implementations, configurable targets, and supports http, http2, and tcp requests with randomization and scheduling options.
MITRE Techniques
- [T1499] Network Denial of Service – NoName057(16) conducts DDoS attacks on target sites to disrupt Ukraine and NATO operations. [“NoName057(16) is conducting a campaign of DDoS attacks on Ukraine and NATO organizations that began in the early days of the war in Ukraine. Targets have included government organizations and critical infrastructure.”]
- [T1071.001] Web Protocols – C2 communications and authentication over HTTP-based protocols; Golang DDOSIA implementations authenticate themselves to C2 servers by issuing an HTTP POST request to the /login_new URL path at the servers and terminate if the authentication fails. [“Golang DDOSIA implementations authenticate themselves to C2 servers by issuing an HTTP POST request to the /login_new URL path at the servers and terminate if the authentication fails.”]
- [T1041] Exfiltration Over C2 Channel – The malware transmits operational statistics to the C2 server at regular intervals to inform operators about progress. [“DDOSIA sends the statistics to the C2 server at regular time intervals.”]
- [T1053] Scheduled Task/Job – Configuration fields indicate capability to schedule network activity over date-time intervals (activate_by_schedule, started_at, finished_at). [“activate_by_schedule, started_at and finished_at indicate that a DDOSIA sample can be configured to schedule the sending of network requests over specific date-time intervals.”]
- [T1105] Ingress Tool Transfer – DDOSIA tooling is hosted and distributed via GitHub Pages and repositories (e.g., dddosia.github.io); attacker content is advertised on Telegram and hosted on GitHub. [“The group has also made use of GitHub to host a variety of illicit activity. This includes using GitHub Pages for freely hosting their DDoS tool website dddosia.github[.]io, and the associated GitHub repositories for hosting the latest version of their tools as advertised in the Telegram channel.”]
Indicators of Compromise
- [Hash] – 94d7653ff2f4348ff38ff80098682242ece6c407, e786c3a60e591dec8f4c15571dbb536a44f861c5 (examples of DDosia installers)
- [Hash] – c86ae9efcd838d7e0e6d5845908f7d09aa2c09f5, e78ac830ddc7105290af4c1610482a41771d753f (additional DDosia PyInstaller/installer hashes)
- [IP Address] – 31.13.195.87, 109.107.181.130 (C2 servers and observed activity)
- [Domain] – tom56gaz6poh13f28[.]myftp.org, zig35m48zur14nel40[.]myftp.org (C2 domains)
- [Telegram Channel] – hxxps://t[.]me/noname05716, hxxps://t[.]me/nn05716chat (primary/secondary Telegram channels)
- [URL] – https://www.defensie[.]nl/actueel/nieuws?pagina={number} (demonstrating target reconnaissance and valid pages)
- [GitHub] – github.com/dddosia, dddosia.github.io, github.com/kintechi341 (tool hosting and distribution)
- [Email] – 05716nnm@proton[.]me (contact channel)
Read more: https://www.sentinelone.com/labs/noname05716-the-pro-russian-hacktivist-group-targeting-nato/