The IT Army of Ukraine Attacks Russian Money Transfer Sites

After a little time away, we’re back and sharing the official target lists from the IT Army of Ukraine. Want to know how to join the fight? Fire up Tor, then sign into your VPN, then go here:

Now, as usual, everything below except the headlines is a copy/paste from the official Telegram channel for the ITAU, which has over 200,000 subscribers right now, down from more than 400,000 at the start of the Russian invasion. That makes it effectively the largest hacktivist action in history. New target lists are announced every few days, and the Ukrainian DDoS software is automatically updated with target lists.


We managed to keep down the main page of ( for three days. It is a Russian money transfer service. The transfer calculation was broken hence transfers did not come through. The domestic DDoS solution laid down hence they had to block subnetworks manually. That was the reason you could oversee with traffic or connectivity at MHDDOS_Proxy. The blocking issues was experienced by real users either.

You did it great and we tend to take a look on another popular money transfer services ( and ( The sanctions implied on Russia are good but often worked around. Should we help them out?

❓First time here? Read here ( or ask our @itarmyhelper_bot how to join.

У нас вийшло на 3 дні вивести з ладу головну форму ( російського сервісу переказу грошей онлайн, що не дозволило розраховувати суму переказу і як результат зробити його. Їх відчизняний DDoS захист не витримав нашої атаки через що росіянам довелося блокувати підмережі вручну. Через це виникали проблеми з трафіком або з’єднаннями в MHDDOS_Proxy. Проблеми через таке недбале блокування відчули й реальні користувачі.

Такий позитивний результат змушує нас привернути увагу на інші популярні онлайн сервіси переказу грошей в росії – ( та ( Західні антиросійські санкції це добре, але росіяни зазвичай обходять їх. Виправимо це?

❓Тут вперше? Прочитай ( або запитай нашого @itarmyhelper_bot як приєднатися до активних дій.

Ukrainian hacktivist sunflowers
Join us!

Target List (443/tcp) (443/tcp) (443/tcp) (443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp) (80/tcp) (80/tcp) (80/tcp) (80/tcp) (80/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp) (80/tcp)
Https:// (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp) (80/tcp, 443/tcp)

Categories: Cyber, Cyberwar, DDoS, Death by 1000 Needles, IT Army of Ukraine, OpIronFall, OpRussia, Politics, Russia, Ukraine, War

2 replies


  1. The IT Army of Ukraine Attacks Russian Money Transfer Sites – The Cryptosphere – Sonya news 2
  2. Two New Victories for the IT Army of Ukraine and Its Hacktivist Allies – The Cryptosphere

Well, tell us what you think!

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: