This is behind the massive pro-Russian cyber-attacks against Switzerland

The pro-Russian hacktivist group “NoName057(16)” continues its DDoS attacks against Swiss servers unabated. Watson’s research shows how criminals organize themselves at Telegram.

Daniel Schurter

Server overload attacks on Swiss targets continued unabated on Tuesday. Behind the DDoS attacks is a pro-Russian online collective called “NoName057(16)”. Members exchange information via the Telegram messaging service.

Who are the attackers targeting?

The DDoS attacks launched last week intensified on Monday, targeting federal government servers in particular.

More server overload attacks followed on Tuesday, including at airports across the country. For example against the website of the regional airport Grenchen SO. But the servers at Geneva International Airport were temporarily brought to their knees by the mass of requests.

The unknown criminals celebrated their allegedly resounding success with several posts on the Telegram channel. They dedicated images with a bear – the symbolic animal of Russia – to the successfully “shot down” targets.

DDoS attack on Bern Regional Airport on June 13, 2023.
The Bern Airport website was down on Tuesday (June 13, 2023) due to a DDoS attack.
DDoS attack at Geneva airport on June 13, 2023.
Image
DDoS attack on Grenchen regional airport, Solothurn.
Image

The Swiss Army website at vgt.admin.ch was temporarily unavailable Tuesday morning. In the afternoon the website was normally accessible again.

The website of Engadin Airport, which suffered from malfunctions on Tuesday morning, was also accessible again as normal on Tuesday afternoon. Those interested in aviation made the same comment in eastern Switzerland.

The website was down Tuesday morning.  After that the situation normalized.

At Telegram, the attackers link to the online service check-host.net. The “Down Time” of the website can be seen on the corresponding statistics pages for the individual Internet addresses (such as vgt.admin.ch).

This screenshot shows that the vtg.admin.ch website was down on Tuesday morning.

How dangerous are these DDoS attacks?

These are not attacks by hackers in which secured IT networks are penetrated in a technically advanced manner in order to steal data or damage systems. DDoS attacks are something like cyber attacks. You could also say: a lot of smoke, little fire.

However, the damage caused by the offline time of websites and online services, which sometimes lasts for hours, should not be underestimated.

  • On the one hand, there is considerable reputational damage if those attacked fail to take effective defensive measures in a timely manner. Major foreign media such as the BBC have already reported on the associated attacks. The hacktivists also like to notice this.
  • On the other hand, the organizations directly affected by the attacks may suffer economic damage due to continued online disruptions.
  • Finally, one can assume a certain psychological effect: no one likes to be attacked. Headlines can lead to insecurity among the public, especially among people who are not very IT savvy.
A Telegram post translated from Russian, with a link to a British BBC report.

Why is Switzerland under attack?

In another Telegram channel, a manifesto of the group “NoName057(16)” published last year can be found, to which it still refers. It is aimed at voluntary donors.

Logo of the pro-Russian hacktivist group «NoName057(16)».
“Every action elicits a reaction. An open information war is being waged against Russia. Western Russophobes use the administrative, financial and technical resources of foreign states and carry out attacks on the infrastructure of the Russian Federation.

We do not intend to stand by and will respond appropriately to their hostile, openly anti-Russian actions. It is unacceptable for Russophobia to become the norm!

We will never harm the innocent, and our actions are in response to the rash actions of all those who have taken an openly hostile attitude. We have enough knowledge, strength and experience to restore the law where it has been violated. We don’t attack ourselves because of our beliefs. Our homeland is our strength.

We do not work on commercial orders or settle bills between competitors.

We are willing to work with hacker groups and “snipers” who share our values ​​as stated in the Manifesto.

Power is in truth, and that’s what we stand for!”

Why are mass attacks expected again on Thursday?

Regarding the video broadcast of a speech by Ukrainian President Volodymyr Zelenskyy in the National Council Chamber on Thursday, the Federal Government’s National Center for Cybersecurity, or NCSC for short, said parliamentary services will do everything possible to ensure that everything went smoothly. For security reasons, there is no specific information about the measures, reports Keystone-SDA.

“While the Swiss authorities continue to supply arms to the Ukrainian Nazis, we continue to punish this country’s Russophobic portals.”

Who are the attackers and what are they getting out of it?

Judging by the posts in the relevant Telegram groups, these are Russian-speaking users. However, the self-proclaimed Russian patriots seem to be getting some encouragement from Western countries. Whether from Western Europe or North America.

In fact, even the most active DDoS fighters can look forward to financial compensationas we shall soon see.

At Telegram, the so-called “DDosia Project” apparently a volunteer project to use special software to help the pro-Russian hacktivist team carry out cyber attacks. There’s even online support to help newbies.

The fact is: With a certain basic technical knowledge or IT knowledge, it is possible for people all over the world to participate in the DDoS attacks. All you have to do is download and install software from Telegram and use a so-called VPN service to disguise your own internet address. You can then participate in the automated attacks at the touch of a button.

The question is who is careless or stupid enough to install a potentially malicious tool from an unknown source on their own device?
DDoS tool from pro-Russian hacktivists.

Anyone who wants to use the DDosia project’s software to participate in attacks must create a cryptocurrency account and log in to a specific server. In fact, the most active fighters can also receive financial compensation for their efforts. An explanatory article in the Russian language states:

««We ask you to consider the project as voluntary and non-binding. Payment of the fee to the crypto wallets of the most active project participants takes place once a month. However, you shouldn’t take this as a salary at some point and ask for more.”
Image

PS: Telegram showed on Tuesday afternoon that the pro-Russian hacktivists are targeting another European country: the website of the Icelandic parliament was no longer accessible.

Sources

  • Various Telegram channels
  • ncsc.admin.nl: DDoS attack on the federal administration: several federal administration websites and applications are unavailable (press release, June 12)
  • Telegraph: Инструкция по использованию ПО DDosia

About the history:

Daniel Schurter

Source: Watson

follow:
Ella

Ella

I'm Ella Sammie, author specializing in the Technology sector. I have been writing for 24 Instatnt News since 2020, and am passionate about staying up to date with the latest developments in this ever-changing industry.

Related Posts