New IP set detected for DDosia.
I created a small script to extract unique hostnames and domains from the DDoSia configuration objects shared via @misp . Post at https://www.vanimpe.eu/2024/10/08/extract-hostnames-and-domains-from-ddosia-misp-object/ ; Script: https://github.com/cudeso/tools/blob/master/ddosia-extract/parse_ddosia.py #DDOS #DDOSIA
TELUS and Cogeco are listed as #DDoSia targets today. Given this follows a NATO announcement by Canada yesterday, will we see other Canadian targets (who are rarely seen on these Russia-sponsored DoS targets?
New configuration detected for DDosia. Hosts:
* metro.kyiv.ua
* agrisupp.com
* www.ztr.ua
* ukragroconsult.com
* academy.ssu.gov.ua #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2024-04-01_08-20-03_DDoSia-target-list-full.json
* https://witha.name/data/2024-04-01_08-20-03_DDoSia-target-list.csv
The #Ddosia Bot #Noname does not catch the .lu (etc.) victims from this group https://t.me/s/CyberArmyofRussia_Reborn/7037 cc @GossiTheDog
New configuration detected for DDosia. Hosts:
* www.piraeusbank.gr
* www.eurobank.gr
* ebanking.eurobank.gr
* secure.alpha.gr
* ose.gr
* www.alpha.gr
* ktelthes.gr #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2024-03-21_07-10-03_DDoSia-target-list-full.json
* https://witha.name/data/2024-03-21_07-10-03_DDoSia-target-list.csv
New configuration detected for DDosia. Hosts:
* www.its-knihovna.cz
* www.imy.se
* www.skatteverket.se
* besip.cz
* www.czechtoll.cz
* auth.kpi.its-knihovna.cz
* www.susjk.cz
* pjpk.rsd.cz
* www.riksgalden.se
* www.mdcr.cz
* www.konkurrensverket.se #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2024-03-06_08-15-05_DDoSia-target-list-full.json
* https://witha.name/data/2024-03-06_08-15-05_DDoSia-target-list.csv
New configuration detected for DDosia. Hosts:
* www.nodeus.se
* obywatel.gov.pl
* czdalnice.cz
* checkbiz.se
* autostrady.mpay.pl
* www.imy.se
* www.riksgalden.se
* www.cdv.cz
* www.sfdi.cz
* www.cspsd.cz
* whm.czdalnice.cz
* www.rsd.cz
* www.skatteverket.se
* www.konkurrensverket.se
* catalog.forsakringskassan.se
* www.regeringen.se
* www.tsk-praha.cz
* mytocz.eu #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2024-03-05_13-05-03_DDoSia-target-list-full.json
*
New configuration detected for DDosia. Hosts:
* www.sienamobilita.it
* www.trentinotrasporti.it
* group.intesasanpaolo.com
* www.amat.pa.it
* intra.anm.it
* www.giorgiameloni.it
* amat.cloud.eleagol.it
* www.ctmcagliari.it
* www.amt.genova.it
* www.sinfomar.it
* www.gtt.to.it
* www.atb.bergamo.it #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2024-02-13_06-10-50_DDoSia-target-list-full.json
* https://witha.name/data/2024-02-13_06-10-50_DDoSia-target-list.csv