101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

485
active users

#noname

1 post1 participant0 posts today
A bot witha.name<p>No Conf Today, No conf today,<br>The system's down, No setup here, Just silence all around.<br> <a href="https://social.circl.lu/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://social.circl.lu/tags/Ddosia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ddosia</span></a> <a href="https://social.circl.lu/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a></p>
Kevin Beaumont<p>NoName continue UK targeting. </p><p>Botnet config: <a href="https://witha.name/data/2025-05-06_07-10-03_DDoSia-target-list.csv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">witha.name/data/2025-05-06_07-</span><span class="invisible">10-03_DDoSia-target-list.csv</span></a></p><p> <a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p><a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> are back targeting UK councils. Same config as prior UK runs. </p><p>Botnet config: <a href="https://witha.name/data/2025-05-05_08-20-03_DDoSia-target-list.csv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">witha.name/data/2025-05-05_08-</span><span class="invisible">20-03_DDoSia-target-list.csv</span></a></p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Patrick Vanhoucke<p><a href="https://mastodon.social/tags/Russian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russian</span></a> <a href="https://mastodon.social/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> collective <a href="https://mastodon.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> has attacked some major <a href="https://mastodon.social/tags/Belgian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Belgian</span></a> <a href="https://mastodon.social/tags/websites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>websites</span></a>. These include <a href="https://mastodon.social/tags/MyGov" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MyGov</span></a>.be (citizen access to official documents) and the platform of the <a href="https://mastodon.social/tags/Walloon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Walloon</span></a> <a href="https://mastodon.social/tags/Parliament" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Parliament</span></a>.</p><p>— via VRTNWS, article in Dutch</p><p><a href="https://vrtnws.be/p.XEkOwKQ5M" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vrtnws.be/p.XEkOwKQ5M</span><span class="invisible"></span></a></p>
Kevin Beaumont<p>These have all been shut down. <a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://cyberplace.social/@GossiTheDog/113596971515491145" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberplace.social/@GossiTheDog</span><span class="invisible">/113596971515491145</span></a></p>
Kevin Beaumont<p>MOD Police’s website is back online today, almost 3 months after NoName DDoS’d it. <a href="https://www.mod.police.uk/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">mod.police.uk/</span><span class="invisible"></span></a></p><p> <a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
:vfd: holm 🦻🏻🤯 :abc:<p>GELÖST!</p><p>(<a href="https://social.saarland/tags/qrcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qrcode</span></a> / <a href="https://social.saarland/tags/datamatrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datamatrix</span></a>) <a href="https://social.saarland/tags/scanner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scanner</span></a> unter <a href="https://social.saarland/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://social.saarland/tags/hilfe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hilfe</span></a>:</p><p>scheinbar egal welcher hersteller (<a href="https://social.saarland/tags/keyence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keyence</span></a>, <a href="https://social.saarland/tags/zebra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zebra</span></a>, <a href="https://social.saarland/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a>) an egal welcher <a href="https://social.saarland/tags/distribution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>distribution</span></a> (<a href="https://social.saarland/tags/mint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mint</span></a>, <a href="https://social.saarland/tags/manjaro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manjaro</span></a>, <a href="https://social.saarland/tags/nixos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nixos</span></a>, thin clients, <a href="https://social.saarland/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a>) können unsere scanner keine umlaute und sonderzeichen wie | pipes…</p><p>an windows stecken wir ein und alles tut out of the box, auch ohne treiber und config.</p><p>was ist das geheimnis korrekter erkennung und tastaturlayoutzuordnung bei <a href="https://social.saarland/tags/barcodescannen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>barcodescannen</span></a> unter linux?</p>
A bot witha.name<p>New configuration detected for DDosia. Hosts:<br>* www.bmi.bund.de<br>* www.balm.bund.de<br>* mdm01.grob-aircraft.com<br>* alurheinfelden.com<br>* www.bmj.de<br>* clientnext.bayernlb.de<br>* grob-aircraft.com<br>* sbahn.berlin<br>* api.sbahn.berlin<br>* www.nrwbank.de<br>* www.elbeflugzeugwerke.com<br>* rheinfelden-semis.eu<br>* www.baywa.com<br>* rheinfelden-carbon.eu<br>* www.cobus-industries.com<br>* www.man-es.com<br>* www.bayernlb.de <a href="https://social.circl.lu/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://social.circl.lu/tags/Ddosia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ddosia</span></a> <a href="https://social.circl.lu/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a><br>* <a href="https://witha.name/data/2025-01-14_07-10-02_DDoSia-target-list-full.json" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">witha.name/data/2025-01-14_07-</span><span class="invisible">10-02_DDoSia-target-list-full.json</span></a><br>*</p>
Max Resing<p>Looks like <a href="https://infosec.exchange/tags/NoName057" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName057</span></a> went after Israeli websites. Was it the first time? Any clues what could have provoked it?</p><p><a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/DDoSia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoSia</span></a> <a href="https://infosec.exchange/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a></p>
Kevin Beaumont<p>There's another variation of the NoName copycat shakedowns - </p><p>there's a group who aren't doing any DDoS, they're just getting the list of actual NoName victims, then emailing them as "NoName057" demanding Bitcoin for the attacks to stop.</p><p>Again, it's very unlikely it's actually NoName - the play appears to be, because NoName are super successful (by just doing layer 7), people are surfing off it for money from confused victims who don't even know what NoName is.</p><p><a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>PSA for defenders, somebody appears to be copying NoName and doing shakedowns for Bitcoin payment.</p><p>They do a copycat layer 7 attack (the tooling real NoName use is basically lifted from Github), and then follow up with an email from "NoName057" for payment.</p><p>I'd strongly advise not paying and make sure your sites are behind a cloud WAF with rate limiting configured, and have origin IP not internet accessible</p><p>It's very unlikely the people doing this one are actually NoName</p><p><a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a></p>
Kevin Beaumont<p>Ministry of Defence Police’s website is still down 18 days later. The latest is they’ve tried to move it behind Cloudflare, but don’t know how to configure DNS. </p><p><a href="https://www.mod.police.uk/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">mod.police.uk/</span><span class="invisible"></span></a></p><p><a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
A bot witha.name<p>clientnext.bayernlb.de<br>* fnherstal.com<br>* grob-aircraft.com<br>* api.sbahn.berlin<br>* www.baywa.com<br>* www.vanhool.com<br>* www.televic.com<br>* www.bmj.de<br>* 1557.kyiv.ua<br>* www.dexia.com<br>* www.migremont.zp.ua<br>* narp.ua<br>* www.minfin.fgov.be<br>* idp.belgiantrain.be<br>* www.man-es.com<br>* www.nrwbank.de <a href="https://social.circl.lu/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://social.circl.lu/tags/Ddosia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ddosia</span></a> <a href="https://social.circl.lu/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a><br>* <a href="https://witha.name/data/2024-12-20_12-10-25_DDoSia-target-list-full.json" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">witha.name/data/2024-12-20_12-</span><span class="invisible">10-25_DDoSia-target-list-full.json</span></a><br>* <a href="https://witha.name/data/2024-12-20_12-10-25_DDoSia-target-list.csv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">witha.name/data/2024-12-20_12-</span><span class="invisible">10-25_DDoSia-target-list.csv</span></a></p>
Kevin Beaumont<p>NoName Germany tracking thread for the week outsourced 😅 <a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p><p><a href="https://infosec.exchange/@jmeyer/113661499854361737" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@jmeyer/11366</span><span class="invisible">1499854361737</span></a></p>
Kevin Beaumont<p>NoName have started testing against Germany. Targets so far are all banks, remarkably successful too - they’re targeting the origin IP to avoid WAF. <a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>NoName trying to get their supporters to find German media contacts, I’m guessing next week is Germany week. </p><p><a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>MOD Police’s website is still down, 8 days later. </p><p><a href="https://www.mod.police.uk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">mod.police.uk</span><span class="invisible"></span></a></p><p> <a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Fafner [_KeyZee_]<p>After targeting Fr websites this week-end <a href="https://infosec.exchange/tags/Noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Noname</span></a> switched this morning to Dk websites…</p>
Kevin Beaumont<p>NoName have moved on to France, as… Trump is there 🫡 or something. </p><p>I’ll stop tracking threads now as I’m selfish. Although I do enjoy being an undercover Russian, and Russian sense of humour is pretty good (and odd). </p><p><a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Kevin Beaumont<p>NoName impact summary for the day is basically the same as it began, the sites online and offline is still the same as when the attacks began for the day.</p><p><a href="https://www.mod.police.uk/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">mod.police.uk/</span><span class="invisible"></span></a> is still down</p><p><a href="https://cyberplace.social/tags/NoName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoName</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>