digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

825
active users

#killnet

0 posts0 participants0 posts today
wrdlbrmpft — #UnPlugTrump<p>Mal sehen wie lange wir die Nerverei los sind:</p><p><a href="https://social.tchncs.de/tags/DDosSia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDosSia</span></a> <a href="https://social.tchncs.de/tags/noname057" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname057</span></a> <a href="https://social.tchncs.de/tags/killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>killnet</span></a> </p><p><a href="https://www.mdr.de/nachrichten/deutschland/panorama/prorussische-hacker-server-abgeschaltet-100.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mdr.de/nachrichten/deutschland</span><span class="invisible">/panorama/prorussische-hacker-server-abgeschaltet-100.html</span></a></p>
Max Resing<p>While diving into the latest <a href="https://infosec.exchange/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> news, I stumbled upon something I wasn't aware yet -- the colloquially named Geneva Code of cyber-war. It defines the rules of engagement for civilian hackers involved in international conflicts. The rules were defined through the <a href="https://blogs.icrc.org/law-and-policy/2023/10/04/8-rules-civilian-hackers-war-4-obligations-states-restrain-them/" rel="nofollow noopener" target="_blank">International Committee of the Red Cross</a>.</p><p>I am unsure, if hacktivists are very keen in following it, but having such a convention appears to be pretty useful to minimize civilian harm.</p><p><a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/Hacktivism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacktivism</span></a> <a href="https://infosec.exchange/tags/ICRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICRC</span></a> <a href="https://infosec.exchange/tags/redcross" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redcross</span></a> <a href="https://infosec.exchange/tags/genevaconvention" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genevaconvention</span></a></p>
Manuel 'HonkHase' Atug<p>Das Internet ist nicht kein rechtsfreier Raum und sich an einem Krieg indirekt zu beteiligen ist generell auch keine gute Idee als Zivilist:</p><p>Operation „Power OFF“: ZIT und HLKA nehmen mutmaßlichen Unterstützer des Hacktivisten-Kollektivs <a href="https://chaos.social/tags/KillNET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KillNET</span></a> fest und stellen umfangreiche Daten sicher</p><p>"Dem 24-jährigen Beschuldigten aus dem Kreis Stormarn (Schleswig-Holstein) wird unter anderem vorgeworfen, die Durchführung von...„Distributed Denial-of-Service“ (<a href="https://chaos.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>)-Angriffe..."<br><a href="https://www.polizei.hessen.de/icc/internetzentral/sub/186/broker.jsp?uCon=186604d1-145d-b391-be7f-3dd40ca743a9" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">polizei.hessen.de/icc/internet</span><span class="invisible">zentral/sub/186/broker.jsp?uCon=186604d1-145d-b391-be7f-3dd40ca743a9</span></a></p>
Dissent Doe :cupofcoffee:<p>What really caught my eye about the indictment of two Sudanese brothers accused of running AnonSudan was that the indictment listed the objects of the conspiracy in ways I do not think I've ever seen before in any DDoS or ransomware indictment. Here are some of the alleged objects of the conspiracy listed in Count One: </p><p>b. to cause the modification, impairment, and potential modification or impairment of the medical examination, diagnosis, treatment, and care of one or more individuals, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(B)(i),(c)(4)(A)(i)(II);</p><p>c. to cause physical injury to any person, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(B)(i),<br>(c)(4)(A)(i)(III); </p><p>d. to cause a threat to public health or safety, in violation of Title 18, United States Code, Section 1030(a)(5)(A),(c)(4)(B)(i), (c)(4)(A)(i)(IV);</p><p>[...]</p><p>g. to attempt to cause and knowingly and recklessly cause serious bodily injury, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(E);</p><p>h. to attempt to cause and knowingly and recklessly cause death, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(F); </p><p>Does intent follow the DDoS target? </p><p>Direct link to indictment: <br><a href="https://www.justice.gov/usao-cdca/media/1373581/dl?inline" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">justice.gov/usao-cdca/media/13</span><span class="invisible">73581/dl?inline</span></a></p><p><a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/AnonSudan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnonSudan</span></a> <a href="https://infosec.exchange/tags/killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>killnet</span></a> </p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>brett</span></a></span></p>
Pyrzout :vm:<p>Russian Hacktivist Group UserSec Opens Recruitment Drive for Hackers <a href="https://thecyberexpress.com/usersec-recruitment-drive-for-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/usersec-re</span><span class="invisible">cruitment-drive-for-hackers/</span></a> <a href="https://social.skynetcloud.site/tags/RecruitmentDriveforHackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RecruitmentDriveforHackers</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/UserSecRecruitment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UserSecRecruitment</span></a> <a href="https://social.skynetcloud.site/tags/hackingtechniques" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingtechniques</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/DarkWebNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWebNews</span></a> <a href="https://social.skynetcloud.site/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> <a href="https://social.skynetcloud.site/tags/UserSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UserSec</span></a></p>
Pyrzout :vm:<p>Anonymous Sudan, KillNet, and Moroccan Black Cyber Targets Israel in New Cyberattack <a href="https://thecyberexpress.com/cyberattack-on-israel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/cyberattac</span><span class="invisible">k-on-israel/</span></a> <a href="https://social.skynetcloud.site/tags/proHamashackergroups" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proHamashackergroups</span></a> <a href="https://social.skynetcloud.site/tags/cyberattackonIsrael" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattackonIsrael</span></a> <a href="https://social.skynetcloud.site/tags/MoroccanBlackCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MoroccanBlackCyber</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/anonymoussudan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymoussudan</span></a> <a href="https://social.skynetcloud.site/tags/HamasandIsrael" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HamasandIsrael</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/HackerClaims" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerClaims</span></a> <a href="https://social.skynetcloud.site/tags/DarkWebNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWebNews</span></a> <a href="https://social.skynetcloud.site/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a></p>
Pyrzout :vm:<p>Decoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024 <a href="https://thecyberexpress.com/killnet-2-0-and-sylhet-gang-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/killnet-2-</span><span class="invisible">0-and-sylhet-gang-hackers/</span></a> <a href="https://social.skynetcloud.site/tags/hackercollective" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackercollective</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/SYLHETGANGSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SYLHETGANGSG</span></a> <a href="https://social.skynetcloud.site/tags/DarkWebNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWebNews</span></a> <a href="https://social.skynetcloud.site/tags/Killnet20" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet20</span></a> <a href="https://social.skynetcloud.site/tags/JustEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JustEvil</span></a> <a href="https://social.skynetcloud.site/tags/Killmilk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killmilk</span></a> <a href="https://social.skynetcloud.site/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a></p>
Dissent Doe :cupofcoffee:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span> had this interesting news item on his <a href="https://infosec.exchange/tags/RiskyBiz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskyBiz</span></a> newsletter:</p><p>"Killnet leader dox: In a surprising turn of events, a regime-controlled news outlet has doxed and revealed the real-world identity of Killmilk, the leader of the infamous pro-Kremlin hacktivist group Killnet. According to Russian news outlet Gazeta, Killmilk is a 30-year-old named Nikolai Nikolaevich Serafimov. The news outlet says it learned of Killmilk's identity from two Russian hacktivist groups, and they later confirmed the dox with a source in Russian law enforcement."</p><p>Read more at Gazeta.ru: <a href="https://www.gazeta.ru/tech/2023/11/21/17878753.shtml" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gazeta.ru/tech/2023/11/21/1787</span><span class="invisible">8753.shtml</span></a></p><p>And if you're not already subscribing to <a href="https://infosec.exchange/tags/RiskyBiz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskyBiz</span></a> newsletter, you're missing out on a great resource: <a href="https://riskybiznews.substack.com/subscribe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">riskybiznews.substack.com/subs</span><span class="invisible">cribe</span></a></p><p><a href="https://infosec.exchange/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> <a href="https://infosec.exchange/tags/Killmilk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killmilk</span></a> <a href="https://infosec.exchange/tags/dox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dox</span></a></p>
[realhackhistory@home]#<p>Trying to prove you've compromised 30 million credentials by posting 100 credentials is some bottom tier nonsense. <a href="https://chaos.social/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> <a href="https://chaos.social/tags/AnonymousSudan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnonymousSudan</span></a> <a href="https://www.crn.com/news/security/microsoft-no-evidence-to-support-hacktivist-data-theft-claim" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crn.com/news/security/microsof</span><span class="invisible">t-no-evidence-to-support-hacktivist-data-theft-claim</span></a></p>
ITSEC News<p>Pro-Russia hackers attack European air traffic control website, but don’t panic! Flights continue as normal - Eurocontrol, the European air traffic control agency, has revealed that it has been under... <a href="https://www.bitdefender.com/blog/hotforsecurity/pro-russia-hackers-attack-european-air-traffic-control-website-but-dont-panic-flights-continue-as-normal/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/pro-russia-hackers-attack-european-air-traffic-control-website-but-dont-panic-flights-continue-as-normal/</span></a> <a href="https://schleuss.online/tags/airtrafficcontrol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>airtrafficcontrol</span></a> <a href="https://schleuss.online/tags/denialofservice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>denialofservice</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>killnet</span></a> <a href="https://schleuss.online/tags/ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ukraine</span></a> <a href="https://schleuss.online/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://schleuss.online/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a></p>
Graham Cluley<p>Pro-Russia hackers attack European air traffic control website, but don't panic! Flights continue as normal.</p><p>Read more in my article on the Bitdefender blog:</p><p> <a href="https://www.bitdefender.com/blog/hotforsecurity/pro-russia-hackers-attack-european-air-traffic-control-website-but-dont-panic-flights-continue-as-normal/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/pro-russia-hackers-attack-european-air-traffic-control-website-but-dont-panic-flights-continue-as-normal/</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.green/tags/denialofservice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>denialofservice</span></a> <a href="https://mastodon.green/tags/ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ukraine</span></a> <a href="https://mastodon.green/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://mastodon.green/tags/killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>killnet</span></a></p>
LSDM<p>Eurocontrol touché par une attaque DDoS massive pro-russe</p><p><a href="https://mamot.fr/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://mamot.fr/tags/Russie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russie</span></a> <a href="https://mamot.fr/tags/Eurocontrol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Eurocontrol</span></a> <a href="https://mamot.fr/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> <a href="https://mamot.fr/tags/DDos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDos</span></a></p><p><a href="https://lsdm.live/modules/news/article.php?storyid=3929" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lsdm.live/modules/news/article</span><span class="invisible">.php?storyid=3929</span></a></p>
Anonymous Germany<p>👆️ <a href="https://social.tchncs.de/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> </p><p><a href="https://t.me/killnet_spike/591" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">t.me/killnet_spike/591</span><span class="invisible"></span></a></p><p>"Am 19. April kündigte das russische Hacker-Netzwerk Killnet einen der größten Angriffe in der Geschichte des Verbands an, der auf die Europäische Organisation für die Sicherheit der Luftfahrt (Eurocontrol) abzielte."</p>
Anonymous Germany<p>Laut Washington Post brachten die <a href="https://social.tchncs.de/tags/PentagonLeaks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PentagonLeaks</span></a> die Behauptung der mit der russischen Regierung verbundenen <a href="https://social.tchncs.de/tags/Hacktivistengruppe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacktivistengruppe</span></a> "Zarya" ans Licht, sie habe sich Zugang zu den Netzwerken eines kanadischen <a href="https://social.tchncs.de/tags/Gaspipeline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaspipeline</span></a>-Unternehmens verschafft. <br>Ein Mitarbeiter des <a href="https://social.tchncs.de/tags/FSB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FSB</span></a> habe angeordnet, den Zugang "aufrechtzuerhalten und auf weitere Anweisungen zu warten."</p><p>Zweifel sind erlaubt. <a href="https://social.tchncs.de/tags/Zarya" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zarya</span></a> ist eher für <a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> bekannt und hängt mit <a href="https://social.tchncs.de/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> ab. Unmöglich ist es dennoch nicht.</p><p><a href="https://www.washingtonpost.com/politics/2023/04/11/leaked-pentagon-documents-claim-that-hackers-breached-canadian-gas-network-heres-what-know/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">washingtonpost.com/politics/20</span><span class="invisible">23/04/11/leaked-pentagon-documents-claim-that-hackers-breached-canadian-gas-network-heres-what-know/</span></a></p>
Hackread.com<p>Pro-Russian <a href="https://mstdn.social/tags/KillNet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KillNet</span></a> hacktivists claim they have hit NATO infrastructure with <a href="https://mstdn.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attacks and stole employee login credentials, which were used to create accounts on gay dating sites in <a href="https://mstdn.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>.</p><p>Read: <a href="https://www.hackread.com/killnet-create-gay-dating-profiles-nato-logins/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackread.com/killnet-create-ga</span><span class="invisible">y-dating-profiles-nato-logins/</span></a></p><p><a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://mstdn.social/tags/NATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NATO</span></a> <a href="https://mstdn.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a></p>
Anonymous Germany<p><a href="https://social.tchncs.de/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> ... <a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a><br>Gegen die Plattform »Wiederaufbau Ukraine« des BMZ<br>»Die Angriffe konnten bislang erfolgreich abgewehrt werden«<br><a href="https://www.spiegel.de/politik/deutschland/attacke-auf-entwicklungsministerium-prorussische-hackergruppe-greift-ukraine-plattform-an-a-64b0e4de-183b-47c7-bd95-05b31202c18f" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spiegel.de/politik/deutschland</span><span class="invisible">/attacke-auf-entwicklungsministerium-prorussische-hackergruppe-greift-ukraine-plattform-an-a-64b0e4de-183b-47c7-bd95-05b31202c18f</span></a></p>
Günter Born<p><a href="https://social.tchncs.de/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> claims responsibility for DDoS attacks on German airports and also on Lufthansa this week</p><p><a href="https://borncity.com/win/2023/02/17/cyberattack-on-german-airports-was-lufthansa-disruption-also-a-killnet-cyberattack/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">borncity.com/win/2023/02/17/cy</span><span class="invisible">berattack-on-german-airports-was-lufthansa-disruption-also-a-killnet-cyberattack/</span></a></p>
Günter Born<p>Schöne Cyber-Verschwörungsthemen zum Wochenabschluss: Pro-Russische Hackergruppe <a href="https://social.tchncs.de/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> greift Flughäfen-Webseiten per DDoS-Attacken an und legt die lahm. Und die reklamieren, das die "Glasfaserkabel-induzierte" Störung der Lufthansa IT am Mittwoch (15.2.2023) ebenfalls ein DDoS-Angriff auf das IT-System war.</p><p><a href="https://www.borncity.com/blog/2023/02/17/cyberangriff-auf-flughfen-war-lufthansa-strung-auch-ein-cyberangriff-von-killnet/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">borncity.com/blog/2023/02/17/c</span><span class="invisible">yberangriff-auf-flughfen-war-lufthansa-strung-auch-ein-cyberangriff-von-killnet/</span></a></p>
tom :verified_paw:<p>How it started: <a href="https://infosec.exchange/tags/Lufthansa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lufthansa</span></a> grounded due to an excavator damaging fiber optic cables. </p><p>How it is going: <a href="https://infosec.exchange/tags/Russian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russian</span></a> <a href="https://infosec.exchange/tags/KillNet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KillNet</span></a> claims it was them - revenge for transporting <a href="https://infosec.exchange/tags/Leopard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leopard</span></a> tanks to <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> 😂</p><p>Reporting by <br>@Reuters<br> <a href="https://ogy.de/zv8w" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">ogy.de/zv8w</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/SlavaUkraini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SlavaUkraini</span></a></p>
tom :verified_paw:<p>🇷🇺 group KillNet claims responsibility for DDoSing NATO servers, namely Force Integration Unit (NFIU) in Tallinn, Naval Command (MARCOM) and Maritime Interdiction Operational Training Centre (NMIOTC).<br>Currently requesting cryptos to buy more DDoS capacity.</p><p>The three hosts appear to still be down.</p><p>Interesting to compare those internet facing hosts with the ACARS message, which suggest issues on the internal network. </p><p>A DDoS for webservers shouldnt have any critical impact on operations.</p><p><a href="https://infosec.exchange/tags/NATO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NATO</span></a> <a href="https://infosec.exchange/tags/NFIU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NFIU</span></a> <a href="https://infosec.exchange/tags/NMIOTC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NMIOTC</span></a> <a href="https://infosec.exchange/tags/DDos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDos</span></a> <a href="https://infosec.exchange/tags/MARCOM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MARCOM</span></a> <a href="https://infosec.exchange/tags/Military" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Military</span></a> <a href="https://infosec.exchange/tags/Defense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Defense</span></a> <a href="https://infosec.exchange/tags/Killnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Killnet</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberWarfare</span></a></p>