#killnet

2025-03-18

Häromveckan utsattes den sociala medieplattformen X för en hackerattack i form av en så kallad riktad denial of service-attack (DDOS). En DDOS-attack eller överbelastningsattack går ut på att överbelasta den utsatta sajten och på så sätt få den att sluta fungera ordentligt.

https://blog.zaramis.se/2025/03/18/hackerattacken-mot-elon-musks-x/

Manuel 'HonkHase' AtugHonkHase@chaos.social
2025-01-20

Das Internet ist nicht kein rechtsfreier Raum und sich an einem Krieg indirekt zu beteiligen ist generell auch keine gute Idee als Zivilist:

Operation „Power OFF“: ZIT und HLKA nehmen mutmaßlichen Unterstützer des Hacktivisten-Kollektivs #KillNET fest und stellen umfangreiche Daten sicher

"Dem 24-jährigen Beschuldigten aus dem Kreis Stormarn (Schleswig-Holstein) wird unter anderem vorgeworfen, die Durchführung von...„Distributed Denial-of-Service“ (#DDoS)-Angriffe..."
polizei.hessen.de/icc/internet

2024-12-13
2024-12-13
Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2024-10-18

What really caught my eye about the indictment of two Sudanese brothers accused of running AnonSudan was that the indictment listed the objects of the conspiracy in ways I do not think I've ever seen before in any DDoS or ransomware indictment. Here are some of the alleged objects of the conspiracy listed in Count One:

b. to cause the modification, impairment, and potential modification or impairment of the medical examination, diagnosis, treatment, and care of one or more individuals, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(B)(i),(c)(4)(A)(i)(II);

c. to cause physical injury to any person, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(B)(i),
(c)(4)(A)(i)(III);

d. to cause a threat to public health or safety, in violation of Title 18, United States Code, Section 1030(a)(5)(A),(c)(4)(B)(i), (c)(4)(A)(i)(IV);

[...]

g. to attempt to cause and knowingly and recklessly cause serious bodily injury, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(E);

h. to attempt to cause and knowingly and recklessly cause death, in violation of Title 18, United States Code, Section 1030(a)(5)(A), (c)(4)(F);

Does intent follow the DDoS target?

Direct link to indictment:
justice.gov/usao-cdca/media/13

#DDoS #AnonSudan #killnet

@campuscodi @brett

Anna Wasilewska-Śpiochavolha@infosec.exchange
2024-07-01

Ile z tego, co słyszeliśmy o haktywistach z Killnetu, było prawdą, a ile PR-ową zagrywką lub sianiem dezinformacji? Czy naprawdę doszło do przeformowania się tej grupy w prywatną firmę wojskową? Co wiemy o jej liderze? Na te i kilka innych pytań odpowiada moja prezentacja z #OhMyHack, oparta na śledztwie w rosyjskich źródłach. Oglądacie na własną odpowiedzialność ;-)

yt.elonego.com/watch?v=SZfFYc5

#killnet #rosja #cyberbezpieczenstwo #omh

Jānis Viļums 🇱🇻​janus1_0@infosec.exchange
2024-02-22

Good job #KillNet, a wordpress site for one school in Paraguay is successfully denazified.

Anna Wasilewska-Śpiochavolha@infosec.exchange
2023-12-18

Posiedziałam dziś chwilę, weryfikując, jak dużo bitcoinów udało się zebrać grupie rosyjskich haktywistów Killnet dzięki postom publikowanym na Telegramie (na jej podstawowym kanale). Wyszło mi, że na 10 powiązanych z grupą portfeli wpłynęło w sumie ok. 23,5 BTC, co stanowi równowartość ponad 960 tys. dolarów. Prawie wszystkie środki zostały już wypłacone.

#tymczasemwRosji #killnet #infosec

Środki na powiązanych z Killnetem portfelach BTC
2023-12-10

Killnet’s new leader, introduced in a separate post on the group’s official Telegram channel, is identified as Deanon Club, a known threat actor with a history of collaboration with Killmilk.

#Cybersecurity #HackerGroup #Killmilk #Russia #Killnet #DeanonClub

cybersec84.wordpress.com/2023/

Dissent Doe :cupofcoffee:PogoWasRight@infosec.exchange
2023-11-24

@campuscodi had this interesting news item on his #RiskyBiz newsletter:

"Killnet leader dox: In a surprising turn of events, a regime-controlled news outlet has doxed and revealed the real-world identity of Killmilk, the leader of the infamous pro-Kremlin hacktivist group Killnet. According to Russian news outlet Gazeta, Killmilk is a 30-year-old named Nikolai Nikolaevich Serafimov. The news outlet says it learned of Killmilk's identity from two Russian hacktivist groups, and they later confirmed the dox with a source in Russian law enforcement."

Read more at Gazeta.ru: gazeta.ru/tech/2023/11/21/1787

And if you're not already subscribing to #RiskyBiz newsletter, you're missing out on a great resource: riskybiznews.substack.com/subs

#Killnet #Killmilk #dox

2023-11-07

A new #NETSCOUT blog post went live on the notorious #threat actor group Anonymous Sudan:

netscout.com/blog/asert/anonym

#AnonymousSudan #killnet #ASERT

joe•iuculano :mastodon:iuculano@masto.ai
2023-10-08

As per #JasonJaySmart

RUSSIA 🇷🇺 IS HACKING ISRAEL 🇮🇱

There are no independent hackers in 🇷🇺:

They all work, directly or indirectly, for the Kremlin.

Killnet, a 🇷🇺 hacking collective under the 🇷🇺 government, has announced that it is attacking Israel 🇮🇱.

Russia is seeking to provoke a global war.

#Russia #Kremlin #Israel #Hamas #Killnet #Hackers

2023-10-07

Red Cross tells hacktivists: stop targeting hospitals. Of course, #KillNet and its ilk don't care; they're likely proxies for Moscow.
databreachtoday.com/blogs/red-

[realhackhistory@home]#realhackhistory@chaos.social
2023-07-06

Trying to prove you've compromised 30 million credentials by posting 100 credentials is some bottom tier nonsense. #Killnet #AnonymousSudan crn.com/news/security/microsof

2023-06-21

Pro-Russian hacktivists have attacked European banking institutions, listing European Investment Bank (#EIB) as one of their victims.
Earlier today, the pro-Russian #Killnet #hackers group claimed on their Telegram to have targeted the inter-network infrastructure of the EIB. cybernews.com/news/european-in

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst