As you’ll already be aware, DDoSin or participating in any kind of cyber-attack in general is illegal, and usually for good reason.
Click "Continue" if you have a VPN, Proxy, the Tor browser or your own secure connection & wish to support Ukraine in taking down Russian propaganda and services aiding Putins invasion
This works by sending GET requests to each targeted website. It’s like opening each website in a random sequence on your PC and re-requesting the data over and over, although the data is not saved or cached, Due to the way it work, It should be fair to say that your Internet service Provider (ISP) won’t be any more bothered about this than they would you browsing the internet, but its always best to stay safe when it comes to security.
Todays message from the IT Army of Ukraine:
Do you remember our attack on Dom.ru provider?
After that, our hackers discovered a vulnerability in the
provider's network security.
The scale of the damage is such that they came to make a
complete replacement of routers, reinstall systems and
restore databases. It also significantly affected the work of
their clients, including the FSB.
In addition, we publish documents that show how the FSB
controls the digital infrastructure and has access to a lot of
data about the residents of the aggressor country.
Join IT ARMY chat.
Additional message for newly added targets:
To keep up with targets we're going to use the db1000n targets
direct from their GitHub repository.
These updates will be daily, so if the db1000n changes, it will
probably take a few hours longer for the change to make it here.