NoName hackers announced another massive operation on Moldovan soil. The hackers managed to produce multiple victims again, targeting high-profile institutions. These include Moldova Governmental Portal, the Multimedia Portal, and the Presidency website.
NoName justified its operation as a way to “punish the Russophobic authorities of Moldova.” This is a standard tactic for the gang, as NoName relies on multiple strategies to impact the reputation of its victims.
The cybercriminal climate has evolved dramatically over the past 2 years, since the beginning of the Ruso-Ukrainian war. NoName is currently the most vocal and active pro-Russian supporter. The gang came public in February of 2022.
Since the beginning of the war, NoName stated its intentions clearly: the protection of the Russian state and the destruction of its enemies. To that end, the hackers have employed a multitude of tactics. These include:
NoName targets governmental institutions primarily and they prioritize those that actively support the Ukrainian government. This refers to military and humanitarian aid, as well as preparing aid packages and funds for future assistance.
The news about NoName’s relentless DDoS operations have circulated in the local and international media. This is primarily due to their intensity and aggressive recurrence. As it stands so far, it doesn’t seem that Moldova has any radical plan moving forward.
As NoName has stated in one of their previous attacks, the local cybersecurity experts have already attempted to shield the target websites from the hackers. With no success, apparently, as the targets were breached anyway.
But how damaging are NoName’s attacks? Fortunately, not very damaging. As the hackers have admitted themselves, the goal is to send a message, not necessarily to inflict damages. Which is why they resort to standard DDoS bot attacks.
These overwhelm the target website with requests, mimicking more visitors and clicks that the server could handle. This often causes the website to crash and render the victim’s services unavailable. Which isn’t a big deal in most cases.
But it can be in others if the victim is a public service provider in charge of public systems. These include health, transportation, and emergency response. Overall, though, NoName’s attacks are little more than a temporary discomfort.
It doesn’t appear that the situation will change anytime soon either. NoName currently runs rampant, often targeting multiple targets across the globe simultaneously. The gang’s domination and resourcefulness have led to the theory of a state-funded org.
Nothing has been confirmed, but one can’t help to wonder.
We believe security online security matters and its our mission to make it a safer place.