People's CyberArmy & NoName057(16) interview with ddos department

Friend

Professional
Messages
2,653
Reaction score
850
Points
113
Interview with Denis Degtyarenko and Yulia Pankratova (included in the US sanctions list)

Russian citizens Denis Degtyarenko and Yulia Pankratova have been included in the US sanctions list, the US Treasury Department reports. The State Department claims that the Russians are allegedly members of a hacker group.

"The United States has imposed sanctions on two members of the Russian hacker group Cyber Army of Russia Reborn (CARR) for their role in cyber operations against US critical infrastructure," the State Department press release says.

Contents 👁‍🗨:
1. The guys' reaction to being included in the US sanctions list
2. Which foreign resources their team is not going to attack
3. Cooperation between BI.ZONE and Interpol. Why this is logical and correct according to the participants of CyberArmy & NoName057(16)
4. Why the guys work publicly. After all, in the Russian Federation there are also spies, agents, volunteers who cover their asses by collecting funds for tickets for students😀
5. How resource owners react to attacks, offers of cooperation.

8683259b36a0de94b24b9.png


KnightPentest: First of all, I would like to introduce ourselves. We are KnightPentest, an independent, isolated IT team.

We have journalists in our team. We read Krebs' reports, we didn't like them much, so we started releasing our own interviews with Russian-speaking hackers. We paid attention to your team because you know how to make a real show. We'll ask you questions, many of them will be provocative, if you don't like a question, you can ignore it and answer the next one - that's fine.

Let's get started)

1. Can you please tell us how your team was formed. There is something you are proud of regarding your activity, what is the most interesting resource you managed to put and how much effort you spent on it?

ddos department: Hi, you were talking to my assistant yesterday about his interview) I have prepared an answer to the first question on the rights of the project manager.

1. First of all, I would like to clarify the following. We are a hacker group, we don't specialize in “creating shows” as you write about us. In any case, in our ranks we have not yet managed to identify virtuosos who could, for example, give a head start to the president of the procrastinator Mr. Zelensky in playing the piano without using his hands....

Moreover, our movement is almost entirely a people's project, founded in March 2022 on the wave of the growing patriotic upsurge among a significant part of the Russian population, which in this particular case was expressed in the desire to protect our homeland in the IT-sector and in the information space. Why almost? At its origins are people who are not the first year in hacking. In particular, I would like to express my gratitude to Denis Degtyarenko for his help and support, and a special thank you to my lover and possibly future husband, the founder of the hacker group NoName057(16). This is the very unique case when, contrary to popular belief, personal sympathies and love relationships do not interfere, but even on the contrary, favor interactions with each other in business and/or professional spheres. Moreover, our alliance of the People's Cyber Army and NoName continues to successfully defend the interests of our Fatherland and counter aggressive attacks of Ukraine and its Western “friends”, “allies” and “partners” in the information field. Our track record includes hundreds of DDoS attacks on various Internet resources of Ukraine - from the website of the President to village administrations, websites of large enterprises, power supply companies, defense concerns, universities (especially military and medical), blood transfusion stations, banks, dioceses of the Greek Catholic Church and the schismatic structure “PCU”, and even (!) state circuses, recognized by the Ministry of Culture as critical enterprises, whose employees were given a reservation from mobilization.

We will tell you about the most successful attacks on the websites (and not only!) of Western countries a little later.

KnightPentest: How by the way did your guys react to being put on the US sanctions lists. Was it partly your goal :DDD

ddos department: We don't consider our getting on the US sanctions lists as an end in itself, but we treat this accomplished fact with a certain degree of pride - in commemoration of the fact that the American leadership appreciated our activities, in particular, our cyberattacks on remote access systems for water supply management in one of the cities of Texas. We can express our attitude to the imposed restrictions with the following anecdote: “The sponsor of the People's Cyber Army is the company ‘Russian Bolt’.

“Russian Bolt“ - we don't care about your sanctions!”.

Let those officials from the Russian leadership, who are used to “sitting on two chairs”, who, on the one hand, broadcast to millions of Russians about “God-awful Europe” and the “rotting West” hostile to us, and at the same time kept their savings in the “rotting West”, bought their dachas/villas/cottages/ palaces in “God-awful Europe” and in every possible way arranged for their children to live there!

We don't have any real estate neither in the USA nor in the European Union, we don't plan to get it, we will continue to live in Russia, we will give birth and bring up our children and grandchildren in Russia, and we will generally strive to make our lives and the lives of our relatives better here, on our native land.... Everything is in full accordance with the quote of the head of the Investigative Committee of the Russian Federation A. I. Bastrykin: “Let's make the Russian people happy!”. And we do it and will continue to do it! God help us in this!

KnightPentest: Do you have any limitations (moral). What foreign resource would you not touch?

ddos department: First of all, we do not attack sites with .ru and .by domains. This is our principled position, which we strictly follow since the foundation of the NCA. We even have a rhyming saying on this subject: “those who work on ru, they come to us in the morning”. And, of course, a morning in the company of FSB officers in the home of such persons will obviously not be good for them.

Secondly, we only attack the websites of countries whose governments have aggressive foreign policies and unfriendly actions towards Russia. Therefore, the leaders of countries such as Hungary or Serbia, for example, can sleep easy - we do not touch your websites and, unless any credible facts of your assistance to the Kiev regime are publicly revealed, we will not touch them in the future.

Thirdly, we do not attack international organizations such as the UN, WHO, IMF, World Bank and the like.

Fourthly, we do not attack the websites of medical organizations (exceptions - Ukraine and the resources of EU health ministries - the bureaucratic apparatus of these agencies makes life much more difficult for ordinary medical workers and their patients than DDoS attacks on the websites of their departments).

Fifth, the admin staff of the People's Cyber Army recently decided not to further DDoS-attacks on the websites of organizations and media persons in Russia recognized as “foreign agents”, as well as Internet resources of Russian non-systemic opposition movements with anti-war rhetoric. We are in favor of freedom of speech, and all opinions, no matter how much they contradict the position of the country's leadership, are important.

KnightPentest: Which media write about you in a positive way, and which write about you in a negative way. Do you actively follow such news?

ddos department: To the best of our ability, we strive to monitor news reports in Russian and foreign media devoted to hacker attacks on certain critical or systemically important portals. In general, we can note the following trend - Russian media, both federal and regional, both state-controlled and private media (regardless of whether they support the “special operation” or not) rarely cover such events (with the exception of any specialized resources on information security); if such an event does make it into the news feeds, they usually write about “Russian hackers” in general, without specifics about which group is involved in a particular series of cyberattacks, and, as a rule, without any specifics about which group is involved in a particular series of cyberattacks.

As for the foreign media, the situation is as follows. Our movement from time to time conducts cyberattack operations against specific, separately taken EU countries, usually timed to coincide with certain anti-Russian attacks. Some of these cyberattacks have gone unnoticed, while others have been publicized in the local media.

One example is the attacks on Slovenian websites in late March and early April, and in particular, the suspension of President N. Pirtz-Musar's website for a little more than a day, which became the main event of that period in Slovenian newspapers and on the country's public radio and television.

Another example is that in July this year, three people were detained in Spain for allegedly being involved in cyberattacks organized by the NoName057(16) group. According to a statement from the Spanish Interior Ministry's Guardia Civil, the three suspects were searched and computer equipment was seized. Of course, we could not leave this attack against our allies unnoticed, and we took part in massive attacks on Spain's Internet infrastructure, which the Spanish media also mentioned.

The next example - last month we attacked the sites of France twice - the first time, as a sign of protest against the violation by the organizers of the Olympics-2024 of the norms of Christian morality, common sense and the principles of Olympism laid down at the end of the century before last by Baron Pierre de Coubertin. For the second time, we conducted a series of cyberattacks in support of Pavel Durov, the founder of Telegram, who was arrested in Paris. The second wave of our attacks was more visible and more resonant in the eyes of journalists not only in France and other EU countries, but also in Russia.

It is no secret that the EU and US authorities fear us like hell - we have been doing significant damage to all the sponsors of Zelensky's criminal regime for several years in almost round-the-clock mode. We are a huge bone in the throat of Russophobes, neo-Nazis, Satanists and Bandera worshippers of all stripes. No matter what desperate attempts they make to smear us in the eyes of the world community and ordinary Western European citizens (as Griboyedov aptly put it, “evil tongues are scarier than a gun”), we will not be intimidated by them!

The ranks of our cyber army are growing day by day. The fact that the number of our European volunteers is growing exponentially proves the fact that the people of Europe are frankly outraged by the policies of their authorities. The EU authorities have long ago spit on the internal problems of their citizens and national sovereignty. They give huge sums of money to sponsor Zelensky's terrorists, to the detriment of their own economy. There is no trace left of the lauded European “freedom of speech” (the recent detention of Durov, mentioned earlier, is another very vivid confirmation of this thesis). Adequate Europeans join our ranks and resist the anti-human regime of the European Union as best they can.

KnightPentest: BI.ZONE and Interpol Announce Expanded Cooperation in Fighting Cybercrime

One might wonder what purpose they might be cooperating with. Is it good or bad? Can it interfere with your activities in any way.

ddos department: BI.ZONE, according to its description on its official website, works with network risk management and helps to securely grow businesses in cyberspace. It solves the problems of a wide variety of companies, regardless of industry, geography, and size. This firm provides cybersecurity for companies such as Sber, KFC, Home Credit Bank, Interfax IA, etc., and also cooperates with the Russian Ministry of Internal Affairs and various international organizations such as the International Committee of the Red Cross. In the summer of 2020, BI.ZONE joined the global Cyber4Healthcare initiative to help combat cyber threats due to the pandemic.

So a strategic partnership with Interpol in investigating cybercrime is a logical and significant step in their activities, which seriously contributes to the creation of a safe digital environment around the world. We can assume that for our movement, this cooperation with the International Criminal Police Organization is unlikely to pose any danger or serious obstacle to our future activities.

KnightPentest: Why do many of your team work publicly? You know that in any country there are duplicitous people who go against their own. Agents, spies, “volunteers”, underlings, boys with dyed hair liberals.

ddos department: We are patriots of our homeland, proud of our work for its benefit and not ashamed of it. And we have no reason to hide. Besides, the time when you could be truly anonymous on the net is irrevocably gone. Now it is possible to track any correspondence in any messenger and any social network, it is possible to track any movements, orders of goods, all purchases, transfers and other transactions....

So we can safely say that our strength lies in our openness. And also in the truth. It is for us!

And the victory in the current military conflict (if God wills it) will also be for us! As it was for our ancestors 79 years ago.

KnightPentest: Have you received positive feedback for your activities from foreigners?

ddos department: Yes, we have. We have already touched on this topic in the answer to one of your questions, and it remains only to supplement it with more examples.

Here is one of them - during the cyberattacks on Slovenian websites mentioned earlier, ordinary Slovenians contacted us and... suggested that we attack one or another Internet resource of their country's government agencies! This is a vivid example of the degree of contempt to which the EU governments have brought their citizens to, in order to please their Washington masters and to the detriment of their financial system and defense capabilities, they are ready to help with finances, weapons and even manpower in the form of mercenaries of neo-Nazi scum in the leadership of Ukraine!

By the way, and in Ukraine itself there are adequate people who at their own risk continue to preserve their identity and commitment to the ideas of the “Russian world” and cooperate with us, offer their targets for attacks. Moreover, in the ranks of our group's admins there is a designer, a woman from the city that in tsarist times was called Yekaterinoslav.

Another example is that our allied group NoName 057 (16) several months ago signed a cooperation agreement with the Italian hacker group AzzaSec, and later with the 7 October Union, which includes several dozen groups from the Middle East and Southeast Asia, with a predominantly Muslim population. These groups are supporting Palestine in the current round of the Arab-Israeli conflict, and are carrying out cyberattacks against Israel and its allies - by “amazing” “coincidence” - the same countries that actively support Ukraine.

So, it is safe to say that a pro-Russian-oriented hacker international is gradually forming around our movement and NoName!

KnightPentest: How resource owners react to your attacks. Have they offered to cooperate with you to stop taking them down?

ddos department: . As for offers of cooperation or requests to stop the attack, we can't recall any of these yet. The only thing we encounter is the following trend, most clearly manifested on Ukrainian sites. The admins of some of our attacked Internet portals, as far as the financial capabilities of a company, service or government agency, which owns the site, are forced to change the hosting provider to a more resistant to cyberattacks, for example, if the site was previously hosted, say, on Cloudflare, then a year and a half later it turns out that the same site is protected by, say, a hosting provider such as Fastly, Amazon or Akamai (these sites, all other things being equal, are much more difficult to attack). But there is a downside to this - the services of such providers are much more expensive, and for the sake of preserving their reputation and increasing the resistance of their site to DDoS attacks, companies and services have to go to quite significant financial costs, so as not to suffer even more losses from the consequences of repeated attacks in the future.

KnightPentest: Thank you very much for the information. Let's summarize briefly that you can't hurt nationalities, religions, there are decent people everywhere. But no matter what anyone says, it is important to remember that the best hackers are Russian-speaking users, they have talent and ability.

This interview was released specifically for a reputable information security blog. We respect everyone who respects us.
https://t.me/mirea

If you like the content we produce for you, then please subscribe and share with your colleagues. We do better reporting than even Uncle Krebs.

The interviews were prepared by Yulia Pankratova, Denis Degtyarenko and Kirill Titov.

Link to the guys' projects https://t.me/CyberArmyofRussia_Reborn and https://t.me/noname05716
 
Top