SYMBOLCOMMON_NAMEaka. SYNONYMS

NoName057(16)  (Back to overview)

aka: 05716nnm, Nnm05716, NoName057, NoName05716

NoName057(16) is performing DDoS attacks on websites belonging to governments, news agencies, armies, suppliers, telecommunications companies, transportation authorities, financial institutions, and more in Ukraine and neighboring countries supporting Ukraine, like Ukraine itself, Estonia, Lithuania, Norway, and Poland.


Associated Families
win.dosia

References
2024-03-01SekoiaSekoia TDR
NoName057(16)’s DDoSia project: 2024 updates and behavioural shifts
Dosia
2023-06-29Sekoiasekoia
Following NoName057(16) DDoSia Project’s Targets
Dosia
2023-05-08ViuleeenzAlessandro Strino
Extracting DDosia targets from process memory
Dosia
2023-04-18Avast DecodedMartin Chlumecký
DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks
Dosia
2023-04-17B42 LabsLuca Mella
Data Insights from Russian Cyber Militants: NoName05716
Dosia
2023-04-17BE42LATEB42 Labs
Noname057(16) Attack Tracker
Dosia
2023-04-04Team CymruS2 Research Team, Team Cymru
A Blog with NoName
Dosia
2023-01-12Sentinel LABSAleksandar Milenkoski, Tom Hegel
NoName057(16) – The Pro-Russian Hacktivist Group Targeting NATO
Bobik Dosia NoName057(16)
2022-12-30GOV.PLGovernment Plenipotentiary for the Security of Information Space of the Republic of Poland
Russian cyberattacks
NoName057(16)
2022-09-06AvastMartin Chlumecký
Pro-Russian Group Targeting Ukraine Supporters with DDoS Attacks
Bobik NoName057(16)

Credits: MISP Project