The creators of the DDoSia attack tool, known as NoName(057)16, have released an updated version incorporating a new feature for retrieving the target list with a barrage of junk HTTP requests.
According to cybersecurity company Sekoia, the new variant, coded in Golang, includes an additional security mechanism to hide the list of targets, which is transmitted from the command-and-control center to the users.
DDoSia, which emerged in 2022 as a successor to the Bobik botnet, is attributed to a pro-Russian hacker group and is primarily used to launch distributed denial-of-service (DDoS) attacks against targets in Europe, Australia, Canada, and Japan.
Read More: DDoSia Attack Tool Evolves with Encryption, Targeting Multiple Sectors
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.