Tuesday, March 4, 2025
HomeBotnetRussia-Linked Hackers Attacking Governmental And Political Organizations

Russia-Linked Hackers Attacking Governmental And Political Organizations

Published on

SIEM as a Service

Follow Us on Google News

Two pro-Russian threat actors launched a distributed denial-of-service (DDoS) attack campaign against Japanese organizations on October 14, 2024.

The campaign targeted logistics, manufacturing, government, and political entities. 

An attack leveraged various non-spoofed direct-path DDoS attack vectors, including well-known nuisance networks, cloud providers, and VPN networks, where the campaign using the DDoSia botnet is ongoing and continues to target new Japanese organizations.

The Russian Ministry of Foreign Affairs expressed concern over Japan’s increasing militarization on October 11, 2024.

In response, pro-Russian threat actors NoName057(16) and the Russian Cyber Army Team launched coordinated DDoS attacks against Japanese targets on October 14-16. 

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

NoName057(16) public attack announcement on Telegram

The delay in the attacks was due to NoName057(16)’s previous focus on disrupting the Belgian elections, highlighting the coordination between these two threat actors, as seen in past attacks.

The NoName057(16) group primarily focused its cyberattacks on the logistics and manufacturing sector, particularly targeting harbors and shipbuilding facilities, which aligns with its usual tactics. 

They also launched many attacks against government, political, and social organizations, including the political party of Japan’s newly elected prime minister, which aimed to generate substantial publicity by targeting high-profile entities.

Most common vectors for NoName057(16) attacks on Japan.
Most common vectors for NoName057(16) attacks on Japan.

NoName057(16) has launched a sophisticated DDoS attack campaign against Japanese targets.

It uses the DDoSia botnet to execute direct-path attacks, employing various attack vectors, including TCP packet flooding (primarily SYN floods) and HTTP-based attacks to maximize impact. 

Multiple attack waves, each utilizing different configurations, have been directed at approximately 40 Japanese domains.

C2 server updates have been observed during typical Russian working hours, suggesting their involvement in the campaign.

NETSCOUT has observed a significant increase in DDoS attacks targeting Japanese networks, with approximately 2,000 attacks occurring daily.

While these attacks are impactful, they do not significantly alter the region’s threat landscape. 

As attack sources, the attackers utilize nuisance networks, cloud providers, and virtual private networks (VPNs), as well as common attack vectors, such as direct-path attack vectors. 

It has been identified that coordinated attacks by Russia-aligned threat actors NoName057(16) and the Russian Cyber Army Team target Japanese logistics, manufacturing, and government entities. 

These attacks, primarily DDoS, did not significantly change the overall threat landscape, but the ongoing threat of DDoS attacks highlights the importance of effective detection and mitigation strategies. 

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...