As you’ll already be aware, DDoSin or participating in any kind of cyber-attack in general is illegal, and usually for good reason.
Click "Continue" if you have a VPN, Proxy, the Tor browser or your own secure connection & wish to support Ukraine in taking down Russian propaganda and services aiding Putins invasion
This works by sending GET requests to each targeted website. It’s like opening each website in a random sequence on your PC and re-requesting the data over and over, although the data is not saved or cached, Due to the way it work, It should be fair to say that your Internet service Provider (ISP) won’t be any more bothered about this than they would you browsing the internet, but its always best to stay safe when it comes to security.
Todays message from the IT Army of Ukraine:
IT ARMY was a part of the attack that carried out on the enemy's DJI controllers firmware update server, which are widely used at the front. This led to a significant malfunction and delays in deploying new drones.
This could affect efficiency of already re-flashed controllers, so the effect was there. The adversary will need time to manually switch everything to backup software update channels. Let's see how quickly they manage that, and how quickly we can find out which server they're using to do it.
Kudos IT ARMY!
Additional message for newly added targets:
To keep up with targets we're going to use the db1000n targets
direct from their GitHub repository.
These updates will be daily, so if the db1000n changes, it will
probably take a few hours longer for the change to make it here.