Slijede razlike između dviju inačica stranice.
Starije izmjene na obje strane Starija izmjena Novija izmjena | Starija izmjena | ||
racfor_wiki:seminari2024:projekt_ddosia [2025/01/23 08:19] Orsag Mihael [Conclusion] |
racfor_wiki:seminari2024:projekt_ddosia [2025/01/27 06:36] (trenutno) Orsag Mihael [Project DDoSia] |
||
---|---|---|---|
Redak 1: | Redak 1: | ||
- | ==== Project DDoSia ==== | + | ====== Project DDoSia |
- | ==== Abstract ==== | + | [[https:// |
+ | ===== Abstract | ||
Project DDoSia is a bot software created by a pro-Russian group, NoName057(16). | Project DDoSia is a bot software created by a pro-Russian group, NoName057(16). | ||
Redak 13: | Redak 14: | ||
Keywords: DDoS, Cybersecurity, | Keywords: DDoS, Cybersecurity, | ||
- | ==== Introduction ==== | + | ===== Introduction |
One of the most powerful and impactful cyberattacks to date is distributed | One of the most powerful and impactful cyberattacks to date is distributed | ||
Redak 32: | Redak 33: | ||
malicious actors to do this job instead, for a certain amount of money. Project | malicious actors to do this job instead, for a certain amount of money. Project | ||
DDoSia is a bot software that takes an interesting, | DDoSia is a bot software that takes an interesting, | ||
- | expanding its botnet by making the joining to the botnet entirely voluntary. | + | expanding its botnet by making the joining to the botnet entirely voluntary. |
- | ==== Early versions ==== | + | {{: |
+ | |||
+ | Figure 1: Network structure of a botnet [6] | ||
+ | |||
+ | ===== Early versions | ||
Project DDoSia has been " | Project DDoSia has been " | ||
Redak 43: | Redak 48: | ||
had around a thousand bots in its botnet.[2] | had around a thousand bots in its botnet.[2] | ||
- | === Recruitment === | + | ==== Recruitment |
Project DDoSia is distributed by the social media platform " | Project DDoSia is distributed by the social media platform " | ||
Redak 54: | Redak 59: | ||
macOS and Windows. | macOS and Windows. | ||
- | {{https:// | + | {{:racfor_wiki: |
- | |Messages in the Project DDoSia Telegram group regarding rewards}} | + | |
- | Figure | + | Figure |
== Linux and macOS == | == Linux and macOS == | ||
Redak 70: | Redak 74: | ||
- | === Client capabilities & communication === | + | ==== Client capabilities & communication |
When executed, the Python script starts the client which starts talking to the | When executed, the Python script starts the client which starts talking to the | ||
Redak 93: | Redak 97: | ||
respectively. | respectively. | ||
- | === Botnet capabilities & targets === | + | ==== Botnet capabilities & targets |
It is estimated that the botnet could produce around 900,000 requests per | It is estimated that the botnet could produce around 900,000 requests per | ||
Redak 114: | Redak 118: | ||
Table 1: Some of the targets of the Project DDoSia botnet [1] | Table 1: Some of the targets of the Project DDoSia botnet [1] | ||
- | Although capable, Project DDoSia botnet did not acquire a pristine | + | Although capable, Project DDoSia botnet did not acquire a pristine |
record. In fact, only around 13% of all the attacks were successful, meaning | record. In fact, only around 13% of all the attacks were successful, meaning | ||
that the target ceased to provide its services.[1] | that the target ceased to provide its services.[1] | ||
- | ==== Further development ==== | + | ===== Further development |
In late 2022 a new version of the bot software was detected, this time written | In late 2022 a new version of the bot software was detected, this time written | ||
Redak 128: | Redak 132: | ||
server, authentication is required. | server, authentication is required. | ||
- | {{https:// | + | {{:racfor_wiki: |
- | Figure | + | Figure |
Additionally, | Additionally, | ||
- | symmetric key encryption, making it harder to. Regarding architectural changes, | + | a symmetric key. Regarding architectural changes, |
at this point the C&C server is located behind two proxy servers, in order to | at this point the C&C server is located behind two proxy servers, in order to | ||
better protect it by keeping its IP address secret. | better protect it by keeping its IP address secret. | ||
- | {{https:// | + | {{:racfor_wiki: |
|C&C server architecture of the newer version of Project DDoSia botnet.[2]}} | |C&C server architecture of the newer version of Project DDoSia botnet.[2]}} | ||
- | Figure | + | Figure |
In April 2023 the number of users in the Project DDoSia telegram group rose to | In April 2023 the number of users in the Project DDoSia telegram group rose to | ||
Redak 148: | Redak 152: | ||
[2] | [2] | ||
- | === Targets === | + | ==== Targets |
With its growing capabilities and resources, the Project DDoSia botnet has | With its growing capabilities and resources, the Project DDoSia botnet has | ||
expanded the list of targets, adding and heavily targeting Finland and Italy | expanded the list of targets, adding and heavily targeting Finland and Italy | ||
- | along Ukraine. The most prevalent targets are govorment | + | along Ukraine. The most prevalent targets are government |
by banking and transportation organizations. | by banking and transportation organizations. | ||
- | {{https:// | + | {{:racfor_wiki: |
|A map of targeted countries by the Project DDoSia botnet in 2024.[5]}} | |A map of targeted countries by the Project DDoSia botnet in 2024.[5]}} | ||
- | Figure | + | Figure |
- | ==== Conclusion ==== | + | ===== Conclusion |
Project DDoSia is a new approach to creating malicious botnets. With the | Project DDoSia is a new approach to creating malicious botnets. With the | ||
Redak 175: | Redak 179: | ||
==== Literature ==== | ==== Literature ==== | ||
- | [1] [[https:// | + | [1] [[https:// |
+ | |||
+ | [2] [[https:// | ||
- | [2] [[https://decoded.avast.io/martinchlumecky/ | + | [3] [[https://socradar.io/what-is-ddosia-project/ |SOCRadar: " |
- | [3] [[https://socradar.io/what-is-ddosia-project/ |SOCRadar, What is DDoSia Project?]]. Accessed: 17.1.2025. | + | [4] [[https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/ |Amaury G., Charles M. and Sekoia TDR: " |
- | [4] [[https:// | + | [5] [[https:// |
- | [5] [[https:// | + | [6] Mahmoud, Muhammad, Manjinder Nir, and Ashraf Matrawy. "A survey on botnet architectures, detection |