Investigating the Infrastructure Behind DDoSia's Attacks

NoName057(16), Research, Threat Intelligence

Executive Summary

DDoSia (DDoSia project) is a participatory distributed denial of service (DDoS) capability created by Russian hacktivists in 2022, early in the Russo-Ukrainian war. DDoSia is designed for volunteers to contribute network resources towards conducting denial of service attacks. Operated by the pro-Russian hacktivist group NoName057(16), attacks have focused heavily on Ukraine and other NATO targets.

Censys has actively monitored DDoSia since mid 2025, following reconstitution after disruption by law enforcement. During this time, we have observed an average of 6 control servers active at any given time; however, servers typically have a relatively short lifespan — averaging 2.53 days. Some servers we have observed are active for over a week, but most instances we only see for less than a few hours. 

Targeting of DDoSia is heavily focused on Ukraine, European allies, and NATO states in government, military, transportation, public utilities, financial, and tourism sectors.

Introduction

First released in March 2022 on Telegram, DDoSia is a distributed denial of service (DDoS) tool operated by the pro Russian hacktivist group NoName057(16). DDoSia is deployed by volunteers and tasked through a central infrastructure; it follows a similar design to other participatory DDoS tools, such as versions of Low Orbit Ion Cannon (LOIC) with HiveMind mode or DDoS tooling distributed by CyberBerkut in 2015. 

A key component of any participatory DDoS system is a mechanism for distributing attack tools and instructions to supporters; for this, NoName057(16) relies heavily on Telegram — having built a following of over 45k prior to law enforcement disruption in July 2025. DDoS capabilities built on traditional malware — such as Mirai — often rely upon self-propagation to reach a volume of infected systems capable of generating a sufficient traffic volume to impact a remote target. Instead, DDoSia relies upon volunteers running DDoSia, presumably on a variety of systems ranging from personal equipment to rented servers and compromised hosts. 

Volunteers do not have the ability to select attack targets; however, NoName057(16) motivates supporters to contribute by offering financial rewards for top contributors and, in pro-Russia ideology, by maintaining an active social media campaign highlighting their anti-Ukrane, anti-NATO views. 

Screenshot of a post and translation from the DDoSia Project Telegram chat with a DDoS disruption claim
Screenshot of a post and translation from the DDoSia Project Telegram chat with a DDoS disruption claim

Technical Characteristics

DDoSia is distributed as a compiled Golang binary through the DDoSia Project Telegram group and available for most modern operating systems and architectures. Open source research has also identified links to the Bobik malware from 2020 that may have been a predecessor to DDoSia. 

Based on the banner printed when run, the authors likely refer to this tool as “Go-Stresser”. Early versions of DDoSia were historically hosted on Github and included a version written in Python. A list of available binaries from the Telegram chat in December 2025 is included in the Appendix.

Previous reporting from Sekoia from June 2023 presented an outstanding overview of how volunteers deploy DDoSia and the communication flow between infected systems and control infrastructure. 

Operational Context

In July 2025, Europol and Eurojust launched a joint international operation known as Eastwood that sought to dismantle DDoSia and the capability established by NoName057(16). The reported results of this operation include and are summarized in the information card following:

  • 2 arrests / 7 arrest warrants issued
  • 24 house searches
  • 13 individual questions
  • +1000 supporters notified of legal liability
  • +100 servers disrupted worldwide. 
Europol information card showing the results of Operation Eastwood
Europol information card showing the results of Operation Eastwood

A key data point from this card is the +1000 supporters notified for their legal liability, because it provides one of the few estimates of how many active volunteers are running DDoSia bots. While the total number of active bots is highly volatile due to the nature of DDoS attacks, we can estimate at low-confidence the total number of DDoS bots controlled by DDoSia is under 10k. This estimate is based on each active supporter running at least one bot, with a potential subset running multiple (but under 10) bots.  

Despite law enforcement action, DDoSia was able to reestablish itself within several days and resumed launching DDoS attacks. Critically, this disruption significantly interrupted communication between operators and volunteers. After losing their main telegram group with 45k subscribers, the reformed group has since reached 14k as of December 2025. The following section summarizes Censys visibility into infrastructure and prevalence trends associated with DDoSia, following this disruption.

Censys Perspective

Censys has actively tracked DDoSia in our Threat Hunting Module since June 2025. Since we started tracking control infrastructure of DDoSia, we have observed a rapidly changing infrastructure with hosts often staying online for less than a day. The following screenshot shows the number of systems online for DDoSia for November 2025.

Graph of DDoSia control servers identified by Censys through November 2025
Count of DDoSia control servers identified by Censys through November 2025

Identified control infrastructure is consistently hosted on Virtual Private Servers (VPS) – typically at Azea, which was sanctioned by the US Treasury Department in 2025, and AS56971 (HostVDS). The following chart shows ASN networks DDoSia infrastructure has been observed throughout November 2025. 

Chart showing ASN usage for DDoSia control infrastructure
Chart showing ASN usage for DDoSia control infrastructure

When looking at the rate at which DDoSia infrastructure changes, we found the mean lifespan of each control server in November was 2.5 days. This was unexpectedly high, given just over half of the identified instances were active for less than 24 hours; however, 10% were online for 10-15 days.

Systems operated by DDoSia typically have minimal public service exposure — often, only exposing 22/TCP for SSH and 80/TCP for HTTP check-ins. This minimal footprint often leaves limited artifacts for researchers to fingerprint. 

Internet exposure for a DDoSia control servers, showing two services open - 80/HTTP and 22/SSH
Internet exposure for a DDoSia control servers, showing two services open – 80/HTTP and 22/SSH

Based on the services and content exposed, it is likely operators are hosting DDoSia on dedicated virtual servers and not on compromised infrastructure. 

In a 2023 blog post, Gen was one of the first to publicly identify that DDoSia control servers consistently returned matching target information and publicly present initial findings that DDoSia was operating a multi-layed control infrastructure. From our scanning and existing open-source intelligence reporting, we suspect DDoSia’s is operating a multi-layered control infrastructure, that may follow the following structure: 

Suspected architecture of DDoSia’s control infrastructure
Suspected architecture of DDoSia’s control infrastructure

Within this structure, systems running DDoSia likely only communicate with a subset of systems we will refer to as Tier 1. IP addresses of these systems are provided by the DDoSia projects Telegram bots to members operating attacking systems. 

The second layer of this we suspect is for obfuscating traffic between systems interacting with bots and core management infrastructure. These systems are short lived (under 24 hours), respond to check in requests, and may be running simple proxy tools to relay traffic from Tier 1.

The final layer of this architecture is likely for core management and accounting systems. Further evidence for this was presented by Team Cymru in 2023, in which they identified netflow links to several systems suspected of acting as database, metric tracking, and service queues for control infrastructure. Around the same time as Team Cymru’s post, Gen also published additional information that included a suspected (partial) screenshot of NoName(057)16’s web control panel for DDoSia – shown below:

Suspected web interface for DDoSia by NoName(057)16.
Suspected web interface for DDoSia by NoName(057)16.

This type of multi-layer infrastructure is typical for mature botnet operators as it provides both redundancy and technical separation between bots and operators.

Conclusion 

DDoSia’s ability to conduct DDoS attacks is an active threat to Ukraine and supporting countries and organizations. Since 2022, it has been used almost continuously for conducting DDoS attacks against Ukraine, European allies and NATO states. These attacks have heavily sought to push back against those supporting Ukraine and included efforts to disrupt transportation of aid and tourism. For defenders, DDoS mitigation tools and services are critical for limiting the impact of DDoSia attacks. 

Appendix

Identified Control Servers

A list of observed control servers based on Censys scanning and publicly available botnet logs is available at this GitHub Gist link

DDoSia Clients

SHA256 Hash File Name
8ba11c9e3d3f38a2473620579f61119be9ada9bc0e4dc37fc045017f56248473 d_freebsd_arm
0e19deac3d64a33495d237ed4cdb3581813b88b6ed2afe84b8c2908201feaf91 d_freebsd_x32
95375dac86bf8daf101cb8120d78f0340e6b1cdbea16b859d96d7aef946be983 d_freebsd_x64
e3f229dc71ce65c1f2de05e2cfbd7ae848d330661d9b9b3fa00d594bf84f4d93 d_lin_arm
48e9d5b0f8a2d56d31b4e845597789a81e3733c03751139a22f55ceebd15b75a d_lin_arm_wr
307e3ea1cb140f375443ef3c9b62028dd5c6449c1bf242b83d6db5d730bd2121 d_lin_x32
2aaf3c08da86d5d0f6f9c00d4011991fd2cd50fa0777d51d5552b98365b15774 d_lin_x64
7ee3574b0693e78060d863a5794437960aec0614af6c1909dd075daec0bcaf92 d_mac_arm64
87cd40fbf9f363c212a8402cc8350f624fd6760799c013a0cdd301707a5bd083 d_mac_x64
0eae66824c65efe6b69937bf8427b7f28df591f2788b8088fbe9a05e8c26e077 d_win_arm64.exe
b81734717f36d3cea59e5690b984333c5a6908a15883a0463d77cb20dadcec0c d_win_x32.exe
532edcad0f1637b4cb6fe2638c84c9cee2a52786b89f8d155c910bf60f43da9c d_win_x64.exe
A young man with short brown hair, wearing a headset microphone, looks attentively against a colorful, illuminated
AUTHOR
Silas Cutler
Principal Security Researcher

Silas Cutler is an experienced security researcher and malware analyst with a focus on investigating organized cyber-crime groups and state-sponsored attacks. Silas brings over 10 years of threat analysis and cybersecurity experience.

Subscribe to our blog