#OpRussia Hacktivist Target List from the IT Army of Ukraine for June 9

One is not sure, one is not, whether or not to put the year in the title, but here’s hoping we will never need that.

Which is just what one thought at the beginning of the pandemic, but oh well…

Let’s get to it, shall we?

First of all, it appears that targets on their target list are staying down longer than previously, which means either that the DDoS weapons are improving significantly or that more people are running them more of the time. Either way, good news for Ukraine, bad news for the Russian economy.

As always, remember your operational security is your own responsibility. Use Tor, then sign into a good VPN (the free ones all log and most of the paid ones do too, but if you enter from Tor they can’t sell you out in the same way). If you leave no prints, you don’t have to worry about Russian bloodhounds.

Headings below, as well as parenthetical remarks are by me/one/the editor, all other content is direct from the IT Army of Ukraine. I am putting One is putting the English first, for SEO reasons.

Putin vs Sunflower
Five bucks on the sunflower. Hell, at this point I think a petunia could take him.

Announcements from the IT Army of Ukraine

Our new target for today is an online part of the “Moi Documenty” (https://ru.wikipedia.org/wiki/%D0%9C%D0%BD%D0%BE%D0%B3%D0%BE%D1%84%D1%83%D0%BD%D0%BA%D1%86%D0%B8%D0%BE%D0%BD%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80) (My Documents) service that allows russian citizens to use public or municipal services. Most of the previous resources are down and are still included in our list of targets (https://gist.github.com/ddosukraine2022/f739250dba308a7a2215617b17114be9).

Сьогодні наша нова ціль це онлайн частина сервісу “Мои Документы” (https://ru.wikipedia.org/wiki/%D0%9C%D0%BD%D0%BE%D0%B3%D0%BE%D1%84%D1%83%D0%BD%D0%BA%D1%86%D0%B8%D0%BE%D0%BD%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80), який дозволяє громадянам росії отримувати державні та муніципальні послуги. Більшість попередніх ресурсів відпочивають і залишаються в списку актуальних цілей (https://gist.github.com/ddosukraine2022/f739250dba308a7a2215617b17114be9).

Target List

https://XN–D1ACHJHDICC8BH4H.XN–P1AI/ (80/tcp, 443/tcp)
https://xn--d1achjhdicc8bh4h.xn--80asehdb/ (80/tcp, 443/tcp)
https://mfc-gosuslugi.ru/ (80/tcp, 443/tcp)

http://mfc01.ru/ (443/tcp)
http://www.altai-mfc.ru/ (80/tcp)
https://mfcrb.ru/ (80/tcp, 443/tcp)
https://mfc.govrb.ru/ (80/tcp, 443/tcp)
http://mfcrd.ru/ (80/tcp, 443/tcp)
http://mfcing.ru/ (80/tcp, 443/tcp)
https://xn--90arfsrm.xn--p1ai/ (80/tcp, 443/tcp)
http://mfc.rk08.ru/ (80/tcp, 443/tcp)
https://umfc.kchgov.ru/ (80/tcp, 443/tcp)
https://mfc-karelia.ru/ (80/tcp, 443/tcp)
http://mydocuments11.ru/ (80/tcp, 443/tcp)
https://mfc.mari-el.gov.ru/ (80/tcp, 443/tcp)
https://www.mfc13.ru/ (80/tcp, 443/tcp)
http://www.mfcrt.ru/ (80/tcp, 443/tcp)
https://mfcur.ru/ (80/tcp, 443/tcp)
http://rmfc-95.ru/ (80/tcp)
https://mfc21.ru/ (80/tcp, 443/tcp)
https://www.mfc-chita.ru/aginsk (80/tcp, 443/tcp)
http://portalmfc.kamgov.ru/ (443/tcp)
https://www.e-mfc.ru/ (80/tcp, 443/tcp)
http://24mfc.ru/ (80/tcp, 443/tcp)
https://www.mfc.permkrai.ru/ (80/tcp, 443/tcp)
https://www.mfc-25.ru/ (80/tcp, 443/tcp)
https://umfc26.ru/ (80/tcp, 443/tcp)
https://mfc27.ru/ (80/tcp, 443/tcp)
https://www.mfc-amur.ru/ (80/tcp, 443/tcp)
https://portal.mfc.gosuslugi29.ru/ (80/tcp, 443/tcp)
http://mfc.adm-nao.ru/ (80/tcp, 443/tcp)
https://mfc.astrobl.ru/ (80/tcp, 443/tcp)
https://www.mfc31.ru/ (80/tcp, 443/tcp)
http://www.mfc38.ru/ (80/tcp, 443/tcp)
https://mfc39.ru/ (80/tcp, 443/tcp)
https://kmfc40.ru/ (80/tcp, 443/tcp)
https://xn--42-jlcennldkec6cj0j.xn--p1ai/ (80/tcp, 443/tcp)
https://xn--43-jlcennldkec6cj0j.xn--p1ai/ (80/tcp, 443/tcp)
http://www.mfc44.ru/ (80/tcp)
https://www.mfc45.ru/ (80/tcp, 443/tcp)
https://www.mfc-kursk.ru/ (80/tcp, 443/tcp)
http://mfc47.ru/ (80/tcp, 443/tcp)
https://gu.spb.ru/ (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp)
https://umfc48.ru/ (80/tcp, 443/tcp)
https://www.mydoc49.ru/ (80/tcp, 443/tcp)
https://md.mos.ru/ (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp)
https://www.mfc51.ru/ (80/tcp, 443/tcp) (80/tcp, 443/tcp)
http://umfc-no.ru/ (80/tcp, 443/tcp)
https://mfc53.novreg.ru/ (80/tcp, 443/tcp)
https://www.mfc-nso.ru/ (80/tcp, 443/tcp)
https://xn—-ttbebjtrq.xn--p1ai/ (80/tcp, 443/tcp)
http://www.mfc56.ru/ (80/tcp, 443/tcp)
http://orenmfc.ru/ (80/tcp)
https://mfc-orel.ru/ (80/tcp, 443/tcp)
https://mfc.pskov.ru/ (80/tcp, 443/tcp)
https://mfc-74.ru/ (80/tcp, 443/tcp)
https://www.mfc76.ru/ (80/tcp, 443/tcp)
http://www.xn--79-7lc6ak.xn--p1ai/ (80/tcp)
http://mfc87.ru/ (80/tcp, 443/tcp)
https://md-crimea.ru/ (80/tcp, 443/tcp)
https://xn--92-7lc6ak.xn--p1ai/ (80/tcp, 443/tcp)

Categories: Anonymous, Cyberwar, DDoS, Death by 1000 Needles, Hacktivism, IT Army of Ukraine, OpRussia, Politics, Ukraine, War

1 reply

  1. Reblogged this on The Cryptosphere and commented:

    Here are today’s targets for the world’s largest hacktivist action, led by the IT Army of Ukraine against the invading Russian forces. The goal here is to disrupt the Russian economy, show the government cannot protect the Russian people, and cause them to become disgruntled, uncooperative, and possibly even revolutionary as a result of loss of faith in Putin.

    So far, so good!


Well, tell us what you think!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: