eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

219
active users

#ddos

13 posts13 participants2 posts today

🪆 DDoS incident disrupts internet for thousands in Moscow

「 The attack, first detected on Tuesday, continued into Friday, disrupting ASVT’s mobile app, website and customer accounts. The provider serves mainly large residential complexes, where residents reported being unable to work remotely, pay at local shops using card terminals, or access their buildings due to disabled internet-based intercom systems 」

therecord.media/moscow-interne

therecord.mediaDDoS incident disrupts internet for thousands in MoscowRussian internet service provider ASVT blamed widespread outages on a DDoS incident and attributed it to a pro-Ukraine collective.

W tym tygodniu @mateuszchrobok wziął na tapet prorosyjskich haktywistów podpisujących się jako NoName057(16) - w DDoS-owaniu bardziej skutecznych niż Killnet*, ale sumarycznie i tak nieudolnych

youtube.com/watch?v=8rt7v9sjHtI

*O Killnecie miałam kiedyś prelekcję, a teraz szykuję artykuł pokazujący dalsze dzieje (czyt. ostatnie podrygi) tej grupy.

@simsus
Im Hacki-Meal immer dabei Windopf, Windopf Server, UnCloud, PaaStinake.

Wie bestellt und outgesourced, so wirds auch angerichtet.

Ob das EU weit zum Appetit auf Cybersecurity und FLOSSengerichte anregt?

Vermutlich nicht.

Der Gutschein von Fasttech im OneDriveIn ist einfach verlockend. Immerhin gibts einen "Kaffee auf" umsonst.

So geht Cyber-Schutzgeld-Erpressung

Der renommierte Sicherheitsforscher und IT-Journalist Brian Krebs tritt mit seinen fachkundigen und gründlichen Recherchen, und deren Veröffentlichung, immer wieder Cybergangstern auf die Füße, auch staatlichen. Damit

pc-fluesterer.info/wordpress/2

www.pc-fluesterer.infoSo geht Cyber-Schutzgeld-Erpressung | pc-flüsterer bremen

Operation Endgame 2.0

International law enforcement agencies have taken additional actions in Operation Endgame, targeting cybercriminal organizations, particularly those behind DanaBot. DanaBot is a powerful modular malware family written in Delphi, capable of keylogging, capturing screenshots, recording desktop videos, exfiltrating files, injecting content into web browsers, and deploying second-stage malware. It operates as a Malware-as-a-Service platform, enabling various attacks. DanaBot has been used in targeted attacks against government officials in the Middle East and Eastern Europe, and for DDoS attacks against Ukrainian servers. The malware implements a custom binary protocol encrypted with RSA and AES, and uses hardcoded C2 servers with Tor as a backup communication channel. Over 50 nicknames have been associated with DanaBot affiliates.

Pulse ID: 683046e8073360953a9307d2
Pulse Link: otx.alienvault.com/pulse/68304
Pulse Author: AlienVault
Created: 2025-05-23 09:59:04

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Continued thread

#CENTR #dDoS Interesting talk since it was not a talk: after a short introduction, people in the room were told to gather in small groups (with no group hving two persons from the same domain registry), discuss on one of the proposed statements, and synthetize their discussion at the end.
Everybody agrees that we should share more information (heard many times in the last 25 years at CENTR...)