MHDDoS_Proxy Updated, plus Russian Diplomatic Targets from the IT Army of Ukraine

Sorry we’ve been offline: Ottawa has had a massive internet outage that’s still not fully resolved (we’d like to think that’s Russia trying to stop us from posting these, but we’d like the liability courts NOT to think that). And dropping the phone in the bathtub effectively removed all our other alternatives. Anyhoodle, we’re back. Let’s get to it, shall we? Big one today.

Announcements

Another update of mhddos_proxy (https://github.com/porthole-ascend-cinnamon/mhddos_proxy) has been released, simplifying its use and improving security.

Recently, we’ve noticed that tools created by volunteers are increasingly being used by a hostile party. This also applies to everyone’s favorite mhddos_proxy through open-source code, the enemy could use it against us and our allies.

The only solution, according to its developers, was to close the source code. We do not want to provide such an effective cyber weapon to our enemy, so we fully support such a decision.

This tool will now work exclusively for IT Army purposes, and the specialists of the Ministry of Digital Transformation will verify its releases. We still have access to the source code, so we can speak about its complete security and reliability.

Shortly, the instructions (https://itarmy.com.ua/instruction/) for mhddos_proxy will be updated on the website, where it will also be indicated how to check which resources this tool attacks.

Вийшло чергове оновлення mhddos_proxy (https://github.com/porthole-ascend-cinnamon/mhddos_proxy), що спрощує його використання та покращує безпеку.

Останнім часом ми помітили, що інструменти створені волонтерами все більше і більше використовуються ворожою стороною. Це також стосується уподобаному всім mhddos_proxy, через відкритий вихідний код ворог міг використовувати його проти нас та наших союзників.

Єдиним рішенням на думку його розробників було закрити вихідний код. Ми не хочемо надавати таку ефективну кібер зброю нашому ворогу тому повністю підтримуємо таке рішення.

Тепер цей інструмент буде працювати виключно по цілям IT Армії, а його релізи перевірятись фахівцями МЦ. Доступ до вихідного коду у нас залишився тому ми можемо говорити про повну його безпеку і найдійність.

В найближчий час інструкція на сайті (https://itarmy.com.ua/instruction/) для mhddos_proxy буде оновлена де також буде вказано, як перевірити, які саме ресурси атакує цей інструмент.

Target List: Diplomatic Targets

Покажемо сьогодні міду росії справжню дипломатію.

Let’s show the russian ministry of foreign affairs some real diplomacy today.

https://www.mid.ru/
194.85.30.210 (443/tcp)
https://lk.mid.ru/
194.85.30.212 (443/tcp)
https://archive.mid.ru/
93.157.56.9 (443/tcp)a
https://dgp.mid.ru/
194.85.30.239 (443/tcp)
https://midpass.ru/
https://matrix.midpass.ru/
https://wf.midpass.ru/
https://info.midpass.ru/
https://wiki.midpass.ru/
https://files.midpass.ru/
https://mon.midpass.ru/
91.231.113.247 (443/tcp)
https://q.midpass.ru/
https://queue.midpass.ru/
91.231.113.234 (443/tcp)
https://zp2020.midpass.ru/
https://biopassportmid.midpass.ru/
https://zp.midpass.ru/
https://deptbook.midpass.ru/
https://ao.midpass.ru/
https://analytics.midpass.ru/
https://auth.midpass.ru/
91.231.113.250 (443/tcp)
http://learn.midpass.ru/
212.188.26.231 (80/tcp)
https://support.midpass.ru/
https://support2.midpass.ru/
91.231.113.237 (443/tcp)
http://www.college-mid.ru/
91.106.207.3 (80/tcp)
https://priem.college-mid.ru/
https://mail.college-mid.ru/
https://sdo.college-mid.ru/
https://post.college-mid.ru/
195.128.54.238 (443/tcp)
http://online.college-mid.ru/
195.128.54.236 (80/tcp)
https://www.dipacademy.ru/
89.188.105.12 (443/tcp)
https://bbb.dipacademy.ru/
89.188.117.138 (443/tcp)
https://rdgw.dipacademy.ru/
89.188.117.131 (443/tcp)
https://sdo.dipacademy.ru/
89.223.100.113 (443/tcp)
https://do.dipacademy.ru/
https://eme.dipacademy.ru/
https://online.dipacademy.ru/
https://ebiblio.dipacademy.ru/
89.188.117.135 (443/tcp)
https://lk2.dipacademy.ru/
89.188.117.136 (443/tcp)
https://turn.dipacademy.ru/
89.208.212.27 (443/tcp)
http://new.dipacademy.ru/
89.111.133.165 (80/tcp)
https://mail.dipacademy.ru/
89.188.117.133 (443/tcp)
https://lk.dipacademy.ru/
89.188.117.137 (443/tcp)
https://evisa.kdmid.ru/
https://evisacheck.kdmid.ru/
193.47.146.136 (443/tcp)
https://www.kdmid.ru/
https://electronic-visa.kdmid.ru/
https://warsaw.kdmid.ru
https://geneve.kdmid.ru/
https://frankfurt.kdmid.ru/
https://sofia.kdmid.ru/
https://madrid.kdmid.ru/
https://pay.kdmid.ru/
https://zagreb.kdmid.ru/
https://tallinn.kdmid.ru/
https://yerevan.kdmid.ru/
https://srch.kdmid.ru/
https://klaipeda.kdmid.ru/
https://colombo.kdmid.ru/
https://strasbourg.kdmid.ru/
https://dk.kdmid.ru/ru/
https://minsk.kdmid.ru/
https://mumbai.kdmid.ru/
https://trabzon.kdmid.ru/
https://milan.kdmid.ru/
https://jakarta.kdmid.ru/
https://tbilisi.kdmid.ru/
https://luxembourg.kdmid.ru/
https://palermo.kdmid.ru/
https://baku.kdmid.ru/
https://bern.kdmid.ru/
https://geneva.kdmid.ru/
https://bonn.kdmid.ru/
https://berlin.kdmid.ru/
https://dublin.kdmid.ru/
https://antalya.kdmid.ru/
https://krakow.kdmid.ru/
https://brazzaville.kdmid.ru/
https://ljubljana.kdmid.ru/
https://praha.kdmid.ru/
https://isfahan.kdmid.ru/
https://debrecen.kdmid.ru/
https://tehran.kdmid.ru/
https://kinshasa.kdmid.ru/
https://villefranche.kdmid.ru/
https://valletta.kdmid.ru/
https://pretoria.kdmid.ru/
https://reykjavik.kdmid.ru/
https://athens.kdmid.ru/
https://alma-ata.kdmid.ru/
https://roma.kdmid.ru/
https://bratislava.kdmid.ru/
https://denmark.kdmid.ru/
https://budapest.kdmid.ru/
https://shanghai.kdmid.ru/
https://london.kdmid.ru/
https://salzburg.kdmid.ru/
https://stockholm.kdmid.ru/
https://legalize.kdmid.ru/
https://leipzig.kdmid.ru/
https://gppdushanbe.kdmid.ru/
https://islamabad.kdmid.ru/
https://wien.kdmid.ru/
https://gyumri.kdmid.ru/
https://osh.kdmid.ru/
https://liepaja.kdmid.ru/
https://hamburg.kdmid.ru/
https://munchen.kdmid.ru/
https://turku.kdmid.ru/
https://edinburgh.kdmid.ru/
https://gpp-bishkek.kdmid.ru/
https://antwerpen.kdmid.ru/
https://oslo.kdmid.ru/
https://kharkov.kdmid.ru/
https://cairo.kdmid.ru/
https://telaviv.kdmid.ru/
https://barcelona.kdmid.ru/
193.47.146.142 (443/tcp)
https://visa.kdmid.ru/
https://visaonline.kdmid.ru/
193.47.146.133 (443/tcp)

(https://itarmy.com.ua/?actual-targets)❓Тут вперше? Прочитай (https://t.me/itarmyofukraine2022/439), як приєднатися до активних дій.

❓First time here? Read here (https://t.me/itarmyofukraine2022/439) how you can join.



Categories: Cyber, Cyberwar, DDoS, Hackers, Hacktivism, IT Army of Ukraine, OpBRICS, OpIronFall, OpRussia, Russia, Ukraine, War

7 replies

  1. Reblogged this on raincoaster and commented:

    A major change in the cyberwar in Ukraine: the IT Army of Ukraine has switched from open source tools to closed. This allows them to control the target lists completely so that they will ONLY attack Russian targets: the Russians or their allies had been using the open source tools against Ukrainian targets. That’s no longer possible.

    Like

  2. Normal people wanna use services and you disturb them. Can you please stop that?

    Like

  3. I’m ukrainian and russian and i need to use servies from this side. i have nothing to do with the war. can you please end this attack?

    Like

  4. I think it is not a good way to disturb the poor people, they only wanna use normal internet services. You will nothing win with this fighting against a giant russian country. stop the cyberattack against poor people’s services.

    Like

  5. why you delete normal comments?

    Like

  6. It’s hilarious to me how amateurish these Russian propaganda bots and Good Germans are.

    You won’t believe it but all of the above comments from “totally normal Russian civilians” came in within a 90-second window and all from exactly the same IP address. I haven’t seen something that inept since I got into a spat with the Church of $cientology back in the early 2000’s!

    Like

Well, tell us what you think!