eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

204
active users

#ddos

1 post1 participant0 posts today
Prof. Dr. Dennis-Kenji Kipker<p><a href="https://chaos.social/tags/Infrastruktur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infrastruktur</span></a> ist replizierbar: Noch Mitte Juli konnte das <a href="https://chaos.social/tags/BKA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BKA</span></a> bei der Operation "<a href="https://chaos.social/tags/Eastwood" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Eastwood</span></a>" einen Erfolg gegen die prorussische <a href="https://chaos.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>-Hackergruppe Noname057(16) erzielen.</p><p>Gefühlt aber sind in diesem Sommer <a href="https://chaos.social/tags/Cyberangriffe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriffe</span></a> - und insbesondere DDoS-Attacken auf öffentliche Einrichtungen nach wie vor an der Tagesordnung.</p><p>Das legt die Vermutung nahe, dass die <a href="https://chaos.social/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> Gruppierung <a href="https://chaos.social/tags/Noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Noname</span></a> trotz der Polizeiaktion nach wie vor nicht unerhebliche Aktivität entfaltet:</p><p><a href="https://www.golem.de/news/trotz-polizeiaktion-prorussische-hacker-weiten-angriffe-auf-deutschland-aus-2507-198648.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/trotz-polizeiakt</span><span class="invisible">ion-prorussische-hacker-weiten-angriffe-auf-deutschland-aus-2507-198648.html</span></a></p>
Ralf Lenz, BOFH Emeritus 🏴‍☠️<p><a href="https://fedi.jrlenz.net/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://fedi.jrlenz.net/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://fedi.jrlenz.net/tags/humor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>humor</span></a></p>
keef<p>So my first evil genius robot honeypot, the word frequency one, seems to be getting hit by a distributed botnet.</p><p>It started around 2-3 requests per second but seems to be ramping up. </p><p>It's using IP addresses from all over the world - could be hacked personal devices? - and a wide range of plausible-looking User Agent strings.</p><p>My server is fine for now - 95% idle CPU.</p><p>Are there people for whom any of the IP or agent data might be useful? Botnet detectorists?</p><p><a href="https://mastodon.online/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.online/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Anna Wasilewska-Śpioch<p>Pogłoski o unieszkodliwieniu NoName057(16) okazały się przedwczesne, zresztą jak zwykle w podobnych przypadkach. Prokremlowska grupa wznowiła ataki DDoS w niecały tydzień po aresztowaniu dwóch jej członków i przejęciu części infrastruktury przez organy ścigania. Tymczasem Recorded Future opublikowała obszerny raport poświęcony projektowi DDoSia, który haktywiści rozwijali w ostatnich latach. Warto sięgnąć, jeśli kogoś ta tematyka interesuje. </p><p>🇬🇧 Anatomy of DDoSia: NoName057(16)'s DDoS Infrastructure and Targeting <br><a href="https://go.recordedfuture.com/hubfs/reports/cta-2025-0722.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.recordedfuture.com/hubfs/re</span><span class="invisible">ports/cta-2025-0722.pdf</span></a> </p><p><a href="https://infosec.exchange/tags/rosja" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rosja</span></a> <a href="https://infosec.exchange/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/ddosia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosia</span></a> <a href="https://infosec.exchange/tags/tymczasemwRosji" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tymczasemwRosji</span></a></p>
John Kristoff<p>Weekend Reads</p><p>* FreeBSD Journal <a href="https://freebsdfoundation.org/our-work/journal/browser-based-edition/networking-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">freebsdfoundation.org/our-work</span><span class="invisible">/journal/browser-based-edition/networking-3/</span></a><br>* Anatomy of DDoSia <a href="https://www.recordedfuture.com/research/anatomy-of-ddosia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">recordedfuture.com/research/an</span><span class="invisible">atomy-of-ddosia</span></a><br>* Dataplane BGP hijack mitigation <a href="https://arxiv.org/abs/2507.14842" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2507.14842</span><span class="invisible"></span></a><br>* Formal specifications for protocols <a href="https://cacm.acm.org/research/it-takes-a-village-bridging-the-gaps-between-current-and-formal-specifications-for-protocols/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cacm.acm.org/research/it-takes</span><span class="invisible">-a-village-bridging-the-gaps-between-current-and-formal-specifications-for-protocols/</span></a><br>* PyPI ecosystem vulnerability analysis <a href="https://arxiv.org/abs/2507.18075" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2507.18075</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://infosec.exchange/tags/Protocols" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Protocols</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a></p>
TugaTech 🖥️<p>Google declara guerra à Badbox 2.0: a botnet que infetou 10 milhões de Androids<br>🔗&nbsp;<a href="https://tugatech.com.pt/t69614-google-declara-guerra-a-badbox-2-0-a-botnet-que-infetou-10-milhoes-de-androids" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tugatech.com.pt/t69614-google-</span><span class="invisible">declara-guerra-a-badbox-2-0-a-botnet-que-infetou-10-milhoes-de-androids</span></a></p><p><a href="https://masto.pt/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://masto.pt/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://masto.pt/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://masto.pt/tags/fraude" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraude</span></a> <a href="https://masto.pt/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://masto.pt/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://masto.pt/tags/judicial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>judicial</span></a> <a href="https://masto.pt/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://masto.pt/tags/seguran%C3%A7a" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>segurança</span></a> <a href="https://masto.pt/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> <a href="https://masto.pt/tags/streaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>streaming</span></a>&nbsp;</p>
Christoph Schmees<p>Russisches DDoS Botnet abgeschaltet</p><p>Das BKA meldet einen Erfolg gegen politisch motivierte Cyber-Kriminalität. Weitere Sekundär-Meldungen gibt es beispielsweise hier oder hier. Die russische Formation NoName057(16) hat ihr gleichnamiges Botnet nur für DDoS-Angriffe benutzt - soweit wir bisher wissen. Die Angriffe richteten sich gegen "unliebsame" </p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/07/20/russisches-ddos-botnet-abgeschaltet/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/07/20/russisches-ddos-botnet-abgeschaltet/</span></a></p><p><a href="https://social.tchncs.de/tags/Allgemein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Allgemein</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://social.tchncs.de/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://social.tchncs.de/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://social.tchncs.de/tags/politik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politik</span></a></p>
Manuel 'HonkHase' Atug<p>Wer sich hinter NoName057(16) verbirgt</p><p>"Manuel Atug, <span class="h-card" translate="no"><a href="https://chaos.social/@AG_KRITIS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>AG_KRITIS</span></a></span> : Was ist ein <a href="https://chaos.social/tags/DDos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDos</span></a>-Angriff?</p><p>DDos-Angriff funktionieren über sehr viele Serversysteme, die sehr groß ans Internet angebunden sind...</p><p>Wird das neue Sicherheitsgesetz <a href="https://chaos.social/tags/NIS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2</span></a> die <a href="https://chaos.social/tags/Beh%C3%B6rden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Behörden</span></a> künftig in die <a href="https://chaos.social/tags/Absicherungspflicht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Absicherungspflicht</span></a> nehmen?</p><p>Atug: Die meisten Behörden und öffentlichen Einrichtungen haben (DDos-Angriffe) unzureichend adressiert, weil es keine rechtlichen Vorgaben gibt..."<br><a href="https://www.mdr.de/nachrichten/deutschland/panorama/angriff-auf-die-infrastruktur-wer-sich-hinter-noname-verbirgt100.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mdr.de/nachrichten/deutschland</span><span class="invisible">/panorama/angriff-auf-die-infrastruktur-wer-sich-hinter-noname-verbirgt100.html</span></a></p>
Hackread.com<p>In an operation called Eastwood, authorities arrested two people and shut down more than 100 servers linked to the Russian group NoName057(16).</p><p>Read: <a href="https://hackread.com/police-shut-down-100-servers-russian-noname05716/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/police-shut-down-</span><span class="invisible">100-servers-russian-noname05716/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mstdn.social/tags/NoName057" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName057</span></a>(16) <a href="https://mstdn.social/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://mstdn.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a></p>

#DDoS als gezielter Eingriff in die staatliche #Souveränität: Massenhafte Überlastungsattacken sind nicht nur eine ernsthafte Gefahr für die #Cybersecurity, sondern ebenso für das staatliche Gemeinwesen, indem auch öffentliche Infrastrukturen für Bürger:innen blockiert werden.

Nachdem es in den letzten Wochen verstärkt DDoS-Angriffe gab, wurden nun die hinter der prorussischen #Hackergruppe #NoName057(16) stehenden Personen ermittelt und das Servernetz abgeschaltet:

tagesschau.de/inland/servernet

tagesschau.de · Behörden schalten Servernetz prorussischer Hacker abIhre Mitglieder haben kritische Infrastruktur, Behörden und Unternehmen angegriffen - jetzt wurde das Servernetz der prorussischen Hackergruppe NoName057(16) in einer international abgestimmten Aktion lahmgelegt.

Operation Eastwood: BKA & Partner zerlegen „NoName057(16)“!
Gestern haben BKA & ZIT zusammen mit sieben Nationen ein Botnetz aus mehreren hundert Servern abgeschaltet, sechs Haftbefehle gegen russische Akteure erwirkt und zeitgleich 24 Objekte durchsucht. Seit November 2023 trafen 14 Angriffswellen rund 250 deutsche Unternehmen, inkl. KRITIS. 🔗 Zum BKA-Bericht: bka.de/SharedDocs/Kurzmeldunge
#CyberSecurity #DDoS #BKA #Cybercrime #hackerangriff