NoName057(16) are targeting the UK today, so I shall start monitoring them and naming their targets and attack types.

Their targeting: https://raw.githubusercontent.com/GossiTheDog/Monitoring/main/NoName/targets_2023_12_07_11am.txt

Currently:
pa.eastcambs.gov.uk
politics.leics.gov.uk
www.liverpool.gov.uk
www.mil.be
www.bollington-tc.gov.uk
www.cranbrooktowncouncil.gov.uk
cert.be
my.swiftcard.org.uk
www.monarchie.be
www.premier.be
www.david-clarinval.be
www.dekamer.be
www.senaat.be

#threatintel #noname

Note this list includes targets they haven't announced yet on Telegram.
Keep up, NoName. Edit: to be clear I mean catch up as I already named these.

quick question - would publishing the NoName DDoS targets in a format like this each day be valuable?

I just had a quick workflow play, I think I can do it.

#threatintel

This is how NoName[16] are DDoSing West Yorkshire Metro.. apparently it's enough to cause Azure App Gateway to fall over.

Later today #NoName will announce they are attacking:

cts21.czechtrade.cz
www.mzv.cz
klient.czechtrade.cz
www.czechtrade.cz
exporters.czechtrade.cz
www.dpp.cz
www.pse.cz
www.moneta.cz
api.moneta.cz
www.rzp.cz
www.senat.cz
pspen.psp.cz
www.vlada.cz
www.mvcr.cz
www.financnisprava.cz
www.policie.cz
www.prg.aero
gate.prg.aero
newfids.prg.aero
ftp.prg.aero
fids.prg.aero
idc-portal-tas.prg.aero

Target list: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_08_10am.txt

#precrime #threatintel

Monitoring/NoName/targets_2023_12_08_10am.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
Noname have named other targets already in the list. #NoName #precrime #threatintel

Today's #NoName DDoS targets #threatintel

www.mtc.government.bg
www.port-varna.bg
port-burgas.bg
www.parliament.bg
customs.bg
bulbankonline.bg
dskbank.bg
www.dskdirect.bg
www.bnb.bg
www.procreditbank.bg
probanking.procreditbank.bg
www.ccbank.bg
www.fibank.bg
my.fibank.bg
testiam-idsext.customs.bg
ids.customs.bg
www.government.bg
www.president.bg

Target list: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_11_11am.txt

Monitoring/NoName/targets_2023_12_11_11am.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName DDoS targets, UK and Norway. Includes a failed attempt at Rishi Sunak's website. #threatintel

www.horiba-mira.com
www.rotork.com
www.lcia.org
southendairport.com
www.stortinget.no
ruter.no
www.autopass.no
www.boreal.no
www.sj.no
bpsnord.no
ferde.no
www.nor-way.no
dskbank.bg
www.bnb.bg
probanking.procreditbank.bg
my.fibank.bg
testiam-idsext.customs.bg
www.government.bg
www.president.bg
www.rishisunak.com

Target list: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_11_3pm.txt

Monitoring/NoName/targets_2023_12_11_3pm.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
Here's the full targeting for Rishi's site:

Here's the #NoName targets today. #threatintel

www.energy-community.org
www.zaporizhstal.com
uges.com.ua
portal.bank.gov.ua
cvp.tax.gov.ua
ssu.gov.ua
bank.gov.ua
kyiv.tax.gov.ua
www.umcc-titanium.com
smtp.energy-community.org
velta-ua.com
www.ztoe.com.ua
ztmc.zp.ua
mcs.energy-community.org
academy.ssu.gov.ua
mgate.energy-community.org
www.ztr.ua
uhe.gov.ua
smtp2.energy-community.org
tax.gov.ua
stockmarket.gov.ua
wvp.tax.gov.ua
www.mev.gov.ua

Target list: https://github.com/GossiTheDog/Monitoring/tree/main/NoName

Monitoring/NoName at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName targets this afternoon. #threatintel

www.europarl.europa.eu
www.mil.be
cert.be
www.monarchie.be
www.premier.be
www.david-clarinval.be
www.dekamer.be
www.senaat.be
www.ecb.europa.eu
www.consilium.europa.eu
curia.europa.eu
www.eesc.europa.eu
www.europol.europa.eu
www.ebrd.com
mobilite-mobiliteit.brussels
idp.belgiantrain.be
www.belgiantrain.be
www.bruxelles.be
www.stib-mivb.be

Target list: https://github.com/GossiTheDog/Monitoring/tree/main/NoName

Monitoring/NoName at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName targets this afternoon are the same as yesterday, apparently they took Friday off. Target list: https://github.com/GossiTheDog/Monitoring/tree/main/NoName

They photoshopped ebrd being offline. https://www.ebrd.com/what-we-do/war-on-ukraine

#threatintel

Monitoring/NoName at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName reran a bunch of prior targets over the past 3 days, e.g. the targeting of the same UK sites again. #threatintel

Some new targets this morning:

www.vfgh.gv.at
immobilien.oebb.at
www.ris.bka.gv.at
www.railtours.oebb.at
bcc.oebb.at
authportal.oebb.at
www.oebb.at
www.e-steiermark.com
www.bmeia.gv.at
presse.oebb.at
bahnhofcitywienwest.oebb.at
shop.oebb.at
serviceline.oebb.at
presse-oebb.at
tsprodsam.oebb.at
apa.at
www.kelag.at

Target list: https://github.com/GossiTheDog/Monitoring/tree/main/NoName

Monitoring/NoName at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName plan to announce Sweden as DDoS targets later today.

Targets:

www.sundsvallshamn.se
www.norrtag.se
www.vasttrafik.se
login.vasttrafik.se
www.polisen.se
www.msb.se
login.msb.se
www.transportstyrelsen.se
www.digg.se
www.sjofartsverket.se
international.stockholm.se
goteborg.se
malmo.se
www.uppsala.se
www.linkoping.se
www.orebro.se
www.vasteras.se
www.eskilstuna.se
www.vgregion.se

Target list and config: https://github.com/GossiTheDog/Monitoring/tree/main/NoName

I have all of NoName's targeting in Excel if data needed.

Monitoring/NoName at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
The screenshots are obviously the condensed version, they do webapp floods primarily, e.g.
There we go. #NoName #threatintel

#NoName DDoS will be going to Italy today.

Their target list:
www.giorgiameloni.it
www.porto.trieste.it
port.taranto.it
www.sinfomar.it
amat.cloud.eleagol.it
www.sienamobilita.it
www.gtt.to.it
www.ctmcagliari.it
actv.avmspa.it
telematicoprova.adm.gov.it
richiestamodifiche.adm.gov.it
iampe.adm.gov.it
telematico.adm.gov.it
www.consob.it
www.assosim.it
www.agcm.it

Target list and config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_21_10am.txt

#threatintel

Monitoring/NoName/targets_2023_12_21_10am.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName DDoS Finland today, as usual they failed to DDoS most of their targets properly.

www.hsl.fi
portofhanko.fi
www.kyberturvallisuuskeskus.fi
www.expressbus.fi
www.ssvoy.fi
virtuaali.vayla.fi
sso.vayla.fi
extranet.vayla.fi
www.traficom.fi
extidpevaluointi.traficom.fi
extidptesti.traficom.fi
ikkuna.traficom.fi
eservices.traficom.fi
paarautatieasema.fi
www.ely-keskus.fi
www.op.fi
www.suomenpankki.fi
www.vero.fi
www.a-katsastus.fi

Target list and config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_22_11am.txt #threatintel

Monitoring/NoName/targets_2023_12_22_11am.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
Btw #NoName use hardcoded server 94.140.115.89 as a C2, and there's no auto update in their DDoS agent which volunteers install, if anybody wants to disrupt them to the point where they have to beg people to reinstall the agent.

#NoName swapped some of their targets

www.hsl.fi
portofhanko.fi
www.edi.admin.ch
www.sob.ch
www.kyberturvallisuuskeskus.fi
www.expressbus.fi
www.ssvoy.fi
virtuaali.vayla.fi
sso.vayla.fi
extranet.vayla.fi
www.traficom.fi
extidpevaluointi.traficom.fi
extidptesti.traficom.fi
ikkuna.traficom.fi
paarautatieasema.fi
www.op.fi
www.suomenpankki.fi
www.hotelleriesuisse.ch

Config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_22_8pm.txt #threatintel

Monitoring/NoName/targets_2023_12_22_8pm.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName are targeting the UK again today… but it’s the same targets for the last four weeks.

I think it is state sponsored operation as they’re trying to meet targets and look busy.. they make even cyber hacktivism boring. I imagine David Brent is the office manager, doing an OKR dance.

#threatintel

#NoName DDoS target list today

www.vfgh.gv.at
www.ris.bka.gv.at
pa.eastcambs.gov.uk
politics.leics.gov.uk
www.a1.group
www.e-steiermark.com
www.liverpool.gov.uk
www.bmeia.gv.at
www.oesterreich.gv.at
www.oebag.gv.at
apa.at
www.cranbrooktowncouncil.gov.uk
www.wymetro.com
travelsouthyorkshire.com
mytsy.travelsouthyorkshire.com

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_23_1pm.txt

#threatintel

Monitoring/NoName/targets_2023_12_23_1pm.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName DDoS targets for Xmas eve, mix of Sweden and Italy.

www.porto.trieste.it
port.taranto.it
www.sinfomar.it
www.norrtag.se
www.vasttrafik.se
login.vasttrafik.se
www.assosim.it
www.transportstyrelsen.se
www.digg.se
www.sjofartsverket.se
international.stockholm.se
goteborg.se
malmo.se
www.uppsala.se
www.orebro.se
www.vasteras.se
www.eskilstuna.se

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_24_6pm.txt

#threatintel

Monitoring/NoName/targets_2023_12_24_6pm.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

#NoName DDoS targets on Xmas Day 🎄

Netherlands and Iceland, includes a bike shed.

over.gvb.nl
www.haestirettur.is
www.althingi.is
www.isavia.is
www.cert.is
www.ov-chipkaart.nl
login.ov-chipkaart.nl
www.ov-nl.nl
www.maa.nl
www.rijkswaterstaat.nl
www.bngbank.nl
www.snsbank.nl
mijn.belastingdienst.nl
services.belastingdienst.nl
bft-plein.bureauft.nl
9292.nl
www.macbike.nl
a-bike.nl
bikecity.nl

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_25_4pm.txt

Monitoring/NoName/targets_2023_12_25_4pm.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
Wonder where #NoName are based 🤣

#NoName DDoS targets today will be in Lithuania

www.siauliai-airport.com
avia.lt
www.adrem.lt
www.linava.lt
autobusustotis.lt
www.vv.lt
elpako.lt
eismoinfo.lt
www.klaipedatransport.lt
www.kvt.lt
www.ollex.lt
nlbus.lt
www.veza.lt
lakd.lt
www.lietuvoskeliai.lt
www.bite.lt
mano.bite.lt
www.cgates.lt
tavo.cgates.lt
init.lt
sso.init.lt
www.balticum.lt
www.manobalticum.lt

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_26_1pm.txt

#threatintel

Monitoring/NoName/targets_2023_12_26_1pm.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub

If it helps anybody prepare for attacks like this, here's an example - init.lt is a telco in country, here's the attacker config.

The infrastructure is on prem.
#NoName don't have much bandwidth as Ddosia is small, what they rely on is webapps failing over under stress.

Each campaign NoName run has a unique ID - when they find an easily downable target, they save the target campaign details and rerun it in the future over and over again on different days to make themselves appear busy.

#NoName DDoS targets for today are in Czech Republic.

www.mfcr.cz
www.army.cz
aobp.cz
www.mpsv.cz
www.penize.cz
www.cssz.cz
mmr.gov.cz
www.kdpcr.cz
www.alv-cr.cz
www.egap.cz
www.kbp.cz
www.komora.cz
uohs.gov.cz
www.soud.cz
www.nku.cz
www.justice.cz
www.nkcr.cz

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_27_10am.txt

#threatintel

Monitoring/NoName/targets_2023_12_27_10am.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
And their post. #NoName #threatintel

#NoName will announce targeting of UK later today. Some new targets this time.

Targets:
pa.eastcambs.gov.uk
www.merlinscottassociates.co.uk
politics.leics.gov.uk
www.liverpool.gov.uk
www.britishchambers.org.uk
www.cranbrooktowncouncil.gov.uk
www.wymetro.com
my.swiftcard.org.uk
ukfinanceproducationb2c.b2clogin.com
www.moneyhelper.org.uk
www.northlinkferries.co.uk
www.justice.gov.uk
www.cbi.org.uk
www.scottishchambers.org.uk

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2023_12_28_10am.txt

#threatintel

Monitoring/NoName/targets_2023_12_28_10am.txt at main · GossiTheDog/Monitoring

Contribute to GossiTheDog/Monitoring development by creating an account on GitHub.

GitHub
Well done to NoName for attempting to DDoS a website that doesn't even exist any more.
And there's the announcement. They're so upset at Rishi they stopped trying to DDoS his website, as they failed last time.

Does anybody have NCSC UK contacts who could give Cranbrook Town Council a heads up they need to hide their origin server?

They went behind Cloudflare as this is the 4th time, but they left their web server on Zen Internet exposed to everybody - so the attackers are still targeting that. It’s in the spreadsheet screenshot above.

@GossiTheDog I always wondered… We see a lot of hackers groups sharing URLs to DDOS. They usually claim success on some URLs which they say are down. Are they really down ? Does it last long ? What is the real impact on these ? If it were a huge problem, wouldn't we hear about it in the news ?

Sorry for the dumb, naive questions. I just want to understand if this actually has a real impact or not.

@GossiTheDog Not Cranbrook Town Council?! These guys really know how to bring a country to its knees.
@GossiTheDog apart from being horrifically mistargeted, are these attacks even effective?
@GossiTheDog I didn’t even know the justice[.]gov.uk website was still running.
@GossiTheDog Why do they still keep trying to target? Might as well just try to DDoS the whole west at once.
@GossiTheDog I don't understand what I'm looking at here. What is the technical attack? What is goal?
@GossiTheDog ahhh nvm. Found the early post. Really need a client that lets me read old to new without having to keep hitting 'load more' & scrolling back to where i left off

@GossiTheDog

How many guesses do we get? 😂 😂

@GossiTheDog as a resident of the netherlands,  glad I’m not traveling
@0xabad1dea @GossiTheDog I'm reading this post while sitting in the train. 😬

@GossiTheDog haha, imagine being so upset at Europe for aiding those in need that you start to DDoS bikesheds

I see at least one non-critical subdomain, I wonder if we could contact them to set the DNS records to point to the C&C server like you did with that other case 

@GossiTheDog
Oh no, now I can't buy regional train tickets online during one of the biggest holidays of the year. Must be the least noticeable timing possible for Sweden.

Yesterday would have been a travel day, and tomorrow people are starting to wonder about visiting secondary relatives (or staying home eating leftovers).

@GossiTheDog So UK today and who gets the x-mas treat tomorrow, Sweden?
@GossiTheDog the targets in Austria were already hit earlier this week. Most mitigations were still in place.
@GossiTheDog again, I am sure they by the end of the day will invent some screenshots of downed websites nevertheless.

@GossiTheDog

Scarfolk Council is not on the list. Disappointing.

@GossiTheDog so you’re saying null route 94.140.115.89 on your border?

@GossiTheDog The target list are quite random and includes many sites that are not related to any critical infrastructure functions or that would cause any kind of issues even if they would be down. The list is something you might come up with if you would just google something without realizing what you're doing.

This just goes to show that this actor is a bloody joke.

@GossiTheDog Looks like the DDoS was so unsuccessful that it was not published by Finnish media or national cybersecurity centre. Could not find it mentioned in the media.
@GossiTheDog amat.cloud.eleagol.it Login.aspx in HTTP 
@GossiTheDog Is this the ERAS tour or what
@GossiTheDog Lovely. Let's see how much of a mess this causes.
Especially interesting to see how MSB handles it, it's their job.

@GossiTheDog Huh, doesn't seem to be a major operation. No delays on most sites, MSB login down for a couple of minutes.

I assume they will loop around...