# domain network attack type
2026-04-17_17-20-07
Noname057(16) has targeted websites primarily in Denmark and South Korea. The attacks have affected various sectors, including energy, transportation, and government services. Key targets include Danish sites like forsyningstilsynet.dk and holbaek.dk, as well as numerous South Korean sites such as kepco.co.kr and khnp.co.kr.AI generated
31 targets are under attack, 0 new targets and 31 targets from previous attack
New Targets(0):
Targets from prev attack(31): www.kepco.co.kr, forsyningstilsynet.dk, holbaek.dk, dable.io, www.kepco-enc.com, www.airtransport.or.kr, www.khnp.co.kr, www.kins.re.kr, eltb2cprod.b2clogin.com, eng.sk.com, nykjaerservice.dk, eltilmelding.dk, english.motir.go.kr, www.hofor.dk, www.knfc.co.kr, www.sk.com, udbudsmedia.dk, esbjergairport.dk, kfst.dk, www.motir.go.kr, home.kepco.co.kr, www.kdhc.co.kr, www.lh.or.kr, www.kaeri.re.kr, www.fkii.org, dinoffentligetransport.dk, apmoller.com, www.knoc.co.kr, kogas-tech.or.kr, www.mofa.go.kr, www.carlc.dk
Dismissed Targets(1): www.kogas.or.kr
2026-04-17_12-05-08
Noname057(16) has targeted various websites primarily in Denmark and South Korea. The attacks include Danish government and utility sites such as forsyningstilsynet.dk and kogas.or.kr, as well as South Korean energy and transportation companies like kepco.co.kr and holbaek.dk. Other notable targets include organizations involved in public transport and energy sectors in both countries, indicating a focus on critical infrastructure.AI generated
32 targets are under attack, 12 new targets and 20 targets from previous attack
New Targets(12): dinoffentligetransport.dk, kfst.dk, apmoller.com, eltilmelding.dk, www.hofor.dk, eltb2cprod.b2clogin.com, holbaek.dk, forsyningstilsynet.dk, www.carlc.dk, nykjaerservice.dk, esbjergairport.dk, udbudsmedia.dk
Targets from prev attack(20): www.kepco-enc.com, www.mofa.go.kr, english.motir.go.kr, www.kaeri.re.kr, home.kepco.co.kr, kogas-tech.or.kr, www.fkii.org, www.knfc.co.kr, www.kepco.co.kr, eng.sk.com, www.lh.or.kr, www.khnp.co.kr, www.knoc.co.kr, dable.io, www.kdhc.co.kr, www.motir.go.kr, www.sk.com, www.airtransport.or.kr, www.kins.re.kr, www.kogas.or.kr
Dismissed Targets(0):
2026-04-17_08-05-07
Noname057(16) has targeted several websites primarily from South Korea. The attacked sites include government and energy-related domains, indicating a focus on critical infrastructure. Key sectors affected include energy, transportation, and technology, with significant implications for national security and public services in South Korea.AI generated
20 targets are under attack, 19 new targets and 1 targets from previous attack
New Targets(19): home.kepco.co.kr, www.mofa.go.kr, eng.sk.com, english.motir.go.kr, www.khnp.co.kr, www.kepco.co.kr, dable.io, kogas-tech.or.kr, www.sk.com, www.knfc.co.kr, www.kdhc.co.kr, www.kepco-enc.com, www.kins.re.kr, www.airtransport.or.kr, www.lh.or.kr, www.motir.go.kr, www.knoc.co.kr, www.kaeri.re.kr, www.fkii.org
Targets from prev attack(1): www.kogas.or.kr
Dismissed Targets(32): www.boliginstallatoren.dk, www.lx.or.kr, daejeon.scourt.go.kr, elcon.dk, www.kt.com, energinet.dk, borgernesparti.dk, www.hancomgroup.com, www.safekorea.go.kr, www.ncloud.com, www.ex.co.kr, www.komsco.com, bce.au.dk, www.djpolice.go.kr, radikalevenstre.dk, kj-el.dk, help.scourt.go.kr, www.skax.co.kr, www.koreapost.go.kr, brabrandel.dk, www.molit.go.kr, www.kesco.or.kr, konservative.dk, www.mobileid.go.kr, www.skcc.co.kr, www.korea.kr, login.konservative.dk, uggerly.dk, kron-el.dk, www.clean.go.kr, auth.ncloud.com, ecfs.scourt.go.kr
2026-04-16_12-05-08
Noname057(16) has targeted various websites primarily in Denmark and South Korea. The attacks have affected a range of sectors, including government, telecommunications, and technology. Key sites include those associated with Danish political parties, South Korean government services, and major corporations in both countries.AI generated
33 targets are under attack, 12 new targets and 21 targets from previous attack
New Targets(12): kron-el.dk, konservative.dk, borgernesparti.dk, uggerly.dk, kj-el.dk, bce.au.dk, www.boliginstallatoren.dk, elcon.dk, energinet.dk, brabrandel.dk, login.konservative.dk, radikalevenstre.dk
Targets from prev attack(21): www.lx.or.kr, www.hancomgroup.com, auth.ncloud.com, www.mobileid.go.kr, www.koreapost.go.kr, www.korea.kr, daejeon.scourt.go.kr, www.skax.co.kr, www.ex.co.kr, help.scourt.go.kr, www.ncloud.com, www.clean.go.kr, www.djpolice.go.kr, www.komsco.com, www.kesco.or.kr, www.molit.go.kr, www.kogas.or.kr, ecfs.scourt.go.kr, www.skcc.co.kr, www.safekorea.go.kr, www.kt.com
Dismissed Targets(0):
2026-04-16_08-05-07
The attacks attributed to noname057 primarily target South Korea, focusing on various government and private sector websites. Key sectors affected include judiciary, energy, telecommunications, and public safety, highlighting a significant threat landscape within the country.AI generated
21 targets are under attack, 21 new targets and 0 targets from previous attack
New Targets(21): www.ex.co.kr, www.molit.go.kr, www.mobileid.go.kr, daejeon.scourt.go.kr, www.kogas.or.kr, www.lx.or.kr, www.komsco.com, www.kt.com, www.skcc.co.kr, www.safekorea.go.kr, www.korea.kr, help.scourt.go.kr, www.kesco.or.kr, www.hancomgroup.com, ecfs.scourt.go.kr, www.clean.go.kr, www.djpolice.go.kr, auth.ncloud.com, www.koreapost.go.kr, www.skax.co.kr, www.ncloud.com
Targets from prev attack(0):
Dismissed Targets(32): traveltrade.visitgreenland.com, www.moleg.go.kr, www.spo.go.kr, home.kepco.co.kr, www.qq.dk, www.mofat.go.kr, www.bnkfn.co.kr, ens.dk, workindenmark.dk, call.nts.go.kr, mit.dk, www.customs.go.kr, inccaa.or.kr, dj.nec.go.kr, www.moj.go.kr, www.stamps.gl, www.taarnby.dk, d.nts.go.kr, www.mois.go.kr, hvidvask.dk, cyber.kepco.co.kr, www.kgs.or.kr, www.mnd.go.kr, www.korad.or.kr, dl.koroad.or.kr, www.koscom.co.kr, nyidanmark.dk, www.seincustoms.com, www.k-ea.kr, arcticexcursions.com, expeditionsgreenland.gl, www.sdu.dk
2026-04-15_12-05-07
The attacks attributed to noname057 primarily targeted websites in Denmark and South Korea. Key sectors affected include government services, customs, and educational institutions. Notable websites include workindenmark.dk and various South Korean government sites such as www.moleg.go.kr and www.mnd.go.kr. Overall, the attacks highlight a focus on critical infrastructure and public services in these countries.AI generated
32 targets are under attack, 12 new targets and 20 targets from previous attack
New Targets(12): traveltrade.visitgreenland.com, www.taarnby.dk, nyidanmark.dk, workindenmark.dk, hvidvask.dk, arcticexcursions.com, ens.dk, www.qq.dk, expeditionsgreenland.gl, www.sdu.dk, www.stamps.gl, mit.dk
Targets from prev attack(20): www.moleg.go.kr, www.mois.go.kr, www.seincustoms.com, d.nts.go.kr, dl.koroad.or.kr, www.koscom.co.kr, www.kgs.or.kr, www.korad.or.kr, www.bnkfn.co.kr, www.customs.go.kr, www.mnd.go.kr, dj.nec.go.kr, cyber.kepco.co.kr, www.moj.go.kr, www.k-ea.kr, call.nts.go.kr, home.kepco.co.kr, inccaa.or.kr, www.spo.go.kr, www.mofat.go.kr
Dismissed Targets(0):
2026-04-15_08-05-07
The attacks attributed to noname057 primarily target South Korea, with a focus on government and critical infrastructure websites. Notable sites include those related to the Ministry of Government Legislation, the National Tax Service, and various financial and customs organizations. The campaign highlights a significant threat to South Korean cyber security, affecting both public and private sectors.AI generated
20 targets are under attack, 20 new targets and 0 targets from previous attack
New Targets(20): www.moleg.go.kr, dj.nec.go.kr, www.k-ea.kr, www.seincustoms.com, www.kgs.or.kr, www.korad.or.kr, www.spo.go.kr, cyber.kepco.co.kr, inccaa.or.kr, www.bnkfn.co.kr, www.mofat.go.kr, www.koscom.co.kr, www.mnd.go.kr, d.nts.go.kr, home.kepco.co.kr, www.customs.go.kr, dl.koroad.or.kr, www.moj.go.kr, www.mois.go.kr, call.nts.go.kr
Targets from prev attack(0):
Dismissed Targets(32): www.reformparty.kr, www.phaseone.com, www.daejeon.go.kr, www.pps.go.kr, airgreenland.com, www.ulsan.go.kr, www.dmi.dk, www.nabo.go.kr, theminjoo.kr, www.ikcba.or.kr, www.incheon.go.kr, jinboparty.com, www.koneps.go.kr, portofkalundborg.dk, www.basicincomeparty.kr, www.airport.kr, krcaa.or.kr, www.nars.go.kr, www.busan.go.kr, solrod.dk, www.bkcba.or.kr, lifeindenmark.borger.dk, ftaro.co.kr, www.karstensens.dk, www.onlinebutik.dk, www.daegu.go.kr, www.jeju.go.kr, www.dsb.dk, holbaek.dk, www.transportministeriet.dk, www.peoplepowerparty.kr, www.greenland-travel.com
2026-04-14_12-05-13
The attacks attributed to noname057 primarily target websites in South Korea and Denmark. Key South Korean sites include various government and political party websites, such as those for Jeju, Daejeon, and the Basic Income Party. In Denmark, the attacks have affected local government sites and travel-related platforms, including Holbaek and Airport.dk. Overall, the focus is on critical infrastructure and political entities in these two countries.AI generated
32 targets are under attack, 12 new targets and 20 targets from previous attack
New Targets(12): holbaek.dk, www.dsb.dk, www.dmi.dk, www.transportministeriet.dk, www.karstensens.dk, portofkalundborg.dk, www.onlinebutik.dk, lifeindenmark.borger.dk, airgreenland.com, solrod.dk, www.phaseone.com, www.greenland-travel.com
Targets from prev attack(20): www.jeju.go.kr, www.ikcba.or.kr, www.basicincomeparty.kr, www.bkcba.or.kr, www.daejeon.go.kr, www.busan.go.kr, www.pps.go.kr, www.ulsan.go.kr, www.koneps.go.kr, www.reformparty.kr, www.peoplepowerparty.kr, www.daegu.go.kr, www.airport.kr, krcaa.or.kr, jinboparty.com, ftaro.co.kr, www.nars.go.kr, theminjoo.kr, www.nabo.go.kr, www.incheon.go.kr
Dismissed Targets(0):
2026-04-14_08-10-08
The attacks by noname057 primarily targeted South Korea, affecting various government and political party websites. Key sites include airport.kr, multiple city government sites like daejeon.go.kr and busan.go.kr, as well as political organizations such as the basicincomeparty.kr and peoplepowerparty.kr. These incidents highlight a focus on South Korean institutions and political entities.AI generated
20 targets are under attack, 20 new targets and 0 targets from previous attack
New Targets(20): theminjoo.kr, www.daejeon.go.kr, ftaro.co.kr, www.bkcba.or.kr, www.basicincomeparty.kr, www.pps.go.kr, www.peoplepowerparty.kr, www.koneps.go.kr, www.jeju.go.kr, www.nabo.go.kr, www.daegu.go.kr, krcaa.or.kr, www.reformparty.kr, www.nars.go.kr, www.busan.go.kr, www.ulsan.go.kr, www.ikcba.or.kr, jinboparty.com, www.incheon.go.kr, www.airport.kr
Targets from prev attack(0):
Dismissed Targets(31): www.g2b.go.kr, www.scangl.dk, logis.korail.go.kr, ringsted.dk, www.seoul.go.kr, hikorea.go.kr, crew.korail.com, rigsadvokaten.dk, www.rn.dk, nrg.dk, www.gov.kr, ntg.com, www.assembly.go.kr, nas.na.go.kr, info.korail.com, news.seoul.go.kr, lawyer.korail.com, netbutik.postnord.dk, scourt.go.kr, www.borger.dk, handelsretten.dk, hrd.korail.com, www.letskorail.com, vs-automatic.dk, win-win.korail.com, law.go.kr, byret.dk, www.raaby-rosendal.dk, hometax.go.kr, eungdapso.seoul.go.kr, www.seoulmetro.co.kr
2026-04-13_12-05-37
The attacks attributed to noname057(16) primarily target websites in Denmark and South Korea. Notable Danish sites include vs-automatic.dk, nrg.dk, and borger.dk, while South Korean targets include win-win.korail.com, scourt.go.kr, and seoul.go.kr. The attacks demonstrate a focus on both governmental and transportation-related platforms in these countries.AI generated
31 targets are under attack, 12 new targets and 19 targets from previous attack
New Targets(12): www.raaby-rosendal.dk, www.borger.dk, ntg.com, netbutik.postnord.dk, handelsretten.dk, vs-automatic.dk, www.rn.dk, ringsted.dk, nrg.dk, rigsadvokaten.dk, byret.dk, www.scangl.dk
Targets from prev attack(19): win-win.korail.com, scourt.go.kr, hrd.korail.com, www.seoul.go.kr, www.seoulmetro.co.kr, hometax.go.kr, www.assembly.go.kr, www.letskorail.com, www.g2b.go.kr, eungdapso.seoul.go.kr, news.seoul.go.kr, law.go.kr, lawyer.korail.com, logis.korail.go.kr, nas.na.go.kr, crew.korail.com, hikorea.go.kr, www.gov.kr, info.korail.com
Dismissed Targets(0):
2026-04-13_09-10-07
The attacks by noname057(16) primarily targeted South Korea, with a focus on various government and transportation websites. Key sites attacked include the official government portal (www.gov.kr), legal resources (law.go.kr), and public transportation services like Korail and Seoul Metro. The attacks highlight vulnerabilities within South Korean digital infrastructure, affecting both governmental operations and public services.AI generated
19 targets are under attack, 0 new targets and 19 targets from previous attack
New Targets(0):
Targets from prev attack(19): law.go.kr, hikorea.go.kr, www.gov.kr, www.seoul.go.kr, eungdapso.seoul.go.kr, news.seoul.go.kr, scourt.go.kr, www.letskorail.com, logis.korail.go.kr, lawyer.korail.com, win-win.korail.com, crew.korail.com, hometax.go.kr, www.assembly.go.kr, nas.na.go.kr, www.g2b.go.kr, info.korail.com, hrd.korail.com, www.seoulmetro.co.kr
Dismissed Targets(1): www.wessexwater.co.uk
2026-04-13_08-10-08
The attacks attributed to noname057(16) primarily targeted South Korea, focusing on various government and transportation-related websites, including Korail and Seoul's municipal services. Additionally, there was an attack on Wessex Water in the UK, indicating a broader scope beyond South Korea.AI generated
20 targets are under attack, 19 new targets and 1 targets from previous attack
New Targets(19): info.korail.com, crew.korail.com, win-win.korail.com, law.go.kr, nas.na.go.kr, logis.korail.go.kr, hrd.korail.com, scourt.go.kr, www.gov.kr, www.seoul.go.kr, www.g2b.go.kr, www.assembly.go.kr, hikorea.go.kr, lawyer.korail.com, news.seoul.go.kr, hometax.go.kr, www.letskorail.com, eungdapso.seoul.go.kr, www.seoulmetro.co.kr
Targets from prev attack(1): www.wessexwater.co.uk
Dismissed Targets(16): www.nwleics.gov.uk, www.yuenergy.co.uk, www.doddgroup.com, redairmedia.co.uk, sky-drones.com, ip.e-paycapita.com, gkn.com, qualifications.wales, www.conwy.gov.uk, www.visitmidwales.co.uk, www.pembrokeshire.gov.uk, www.localgoveasteng.gov.uk, www.sport.wales, www.dundeecity.gov.uk, arts.wales, chess-dynamics.com
2026-04-12_09-05-09
Noname057(16) has targeted various websites primarily from the United Kingdom, including local government sites such as pembrokeshire.gov.uk, dundeecity.gov.uk, and nwleics.gov.uk. Other affected sectors include education and qualifications with qualifications.wales and arts organizations like arts.wales. Additionally, businesses such as gkn.com and wessexwater.co.uk were also attacked, indicating a broad range of targets across public services and private enterprises in the UK.AI generated
17 targets are under attack, 0 new targets and 17 targets from previous attack
New Targets(0):
Targets from prev attack(17): www.pembrokeshire.gov.uk, qualifications.wales, www.dundeecity.gov.uk, www.nwleics.gov.uk, www.visitmidwales.co.uk, sky-drones.com, www.wessexwater.co.uk, redairmedia.co.uk, www.conwy.gov.uk, arts.wales, www.yuenergy.co.uk, ip.e-paycapita.com, www.doddgroup.com, www.localgoveasteng.gov.uk, gkn.com, www.sport.wales, chess-dynamics.com
Dismissed Targets(4): hinaray.com, evolvedynamics.com, olsenactuators.com, buckfastleigh.gov.uk
2026-04-12_08-05-07
The attacks attributed to noname057(16) primarily target websites in the United Kingdom, including government and local authority sites such as dundeecity.gov.uk, conwy.gov.uk, and pembrokeshire.gov.uk. Other affected sectors include media, energy, and technology, with sites like redairmedia.co.uk, yuenergy.co.uk, and gkn.com being compromised. The focus appears to be on a mix of public services and private enterprises, indicating a broad scope of interest in various industries within the UK.AI generated
21 targets are under attack, 17 new targets and 4 targets from previous attack
New Targets(17): sky-drones.com, ip.e-paycapita.com, www.wessexwater.co.uk, www.conwy.gov.uk, redairmedia.co.uk, www.doddgroup.com, www.yuenergy.co.uk, www.localgoveasteng.gov.uk, qualifications.wales, www.pembrokeshire.gov.uk, www.sport.wales, chess-dynamics.com, gkn.com, www.dundeecity.gov.uk, arts.wales, www.nwleics.gov.uk, www.visitmidwales.co.uk
Targets from prev attack(4): hinaray.com, evolvedynamics.com, olsenactuators.com, buckfastleigh.gov.uk
Dismissed Targets(12): mysmartenergy.uk, www.renewableuk.com, www.keighley.gov.uk, www.tameside.gov.uk, oneonline.bradford.gov.uk, politics.leics.gov.uk, www.salford.gov.uk, www.poweron-uk.co.uk, ukerc.rl.ac.uk, ukbusinessswitch.co.uk, www.harwichtowncouncil.co.uk, www.blackburn.gov.uk
2026-04-11_09-10-07
The attacks by noname057 primarily targeted websites in the United Kingdom, including local government sites, energy companies, and renewable energy organizations. Key countries under attack include the UK, with a focus on various municipalities and energy-related entities.AI generated
16 targets are under attack, 0 new targets and 16 targets from previous attack
New Targets(0):
Targets from prev attack(16): evolvedynamics.com, ukerc.rl.ac.uk, www.blackburn.gov.uk, www.poweron-uk.co.uk, mysmartenergy.uk, ukbusinessswitch.co.uk, oneonline.bradford.gov.uk, hinaray.com, www.renewableuk.com, www.harwichtowncouncil.co.uk, politics.leics.gov.uk, www.keighley.gov.uk, olsenactuators.com, www.tameside.gov.uk, buckfastleigh.gov.uk, www.salford.gov.uk
Dismissed Targets(3): login.yorkshirewater.com, www.yorkshirewater.com, my.yorkshirewater.com
2026-04-11_08-10-09
The attacks by noname057 primarily targeted websites in the United Kingdom, affecting various sectors including local government, utilities, and business services. Notable sites include evolvedynamics.com, several local council websites such as oneonline.bradford.gov.uk and yorkshirewater.com, as well as organizations like renewableuk.com and ukbusinessswitch.co.uk. The incidents highlight a concentrated effort against UK-based online services and infrastructure.AI generated
19 targets are under attack, 16 new targets and 3 targets from previous attack
New Targets(16): oneonline.bradford.gov.uk, www.salford.gov.uk, www.keighley.gov.uk, www.harwichtowncouncil.co.uk, hinaray.com, ukbusinessswitch.co.uk, www.renewableuk.com, olsenactuators.com, www.poweron-uk.co.uk, www.blackburn.gov.uk, ukerc.rl.ac.uk, www.tameside.gov.uk, buckfastleigh.gov.uk, evolvedynamics.com, mysmartenergy.uk, politics.leics.gov.uk
Targets from prev attack(3): my.yorkshirewater.com, login.yorkshirewater.com, www.yorkshirewater.com
Dismissed Targets(20): electricityproduction.uk, www.test.khadb.kh.ua, www.stamfordmercury.co.uk, ukrjet.ua, keramet.com.ua, refaiglobal.co.uk, www.glasgow.gov.uk, www.yorkpress.co.uk, www.edinburghdronecompany.co.uk, www.johnrigbyandco.com, vsenergy.com.ua, www.kza.com.ua, lemtrans.com.ua, www.iskra.zp.ua, refaigroup.co.uk, scqf.org.uk, sparing-vist.ua, www.srdsc.com, www.lbc.co.uk, nadu.com.ua
2026-04-10_18-00-11
The attacks attributed to noname057 primarily targeted websites in the United Kingdom and Ukraine. Key sectors affected include media, energy, and local government services. Notable sites include Yorkshire Water, various local news outlets, and Ukrainian energy companies, indicating a focus on critical infrastructure and public services in these regions.AI generated
23 targets are under attack, 0 new targets and 23 targets from previous attack
New Targets(0):
Targets from prev attack(23): www.srdsc.com, www.lbc.co.uk, login.yorkshirewater.com, ukrjet.ua, keramet.com.ua, www.kza.com.ua, www.edinburghdronecompany.co.uk, vsenergy.com.ua, scqf.org.uk, www.yorkpress.co.uk, my.yorkshirewater.com, refaigroup.co.uk, refaiglobal.co.uk, electricityproduction.uk, nadu.com.ua, www.glasgow.gov.uk, www.johnrigbyandco.com, www.iskra.zp.ua, sparing-vist.ua, www.stamfordmercury.co.uk, lemtrans.com.ua, www.test.khadb.kh.ua, www.yorkshirewater.com
Dismissed Targets(7): gkn.com, redairmedia.co.uk, www.doddgroup.com, www.localgoveasteng.gov.uk, www.wessexwater.co.uk, www.dundeecity.gov.uk, www.yuenergy.co.uk
2026-04-10_12-05-10
The attacks attributed to noname057(16) have primarily targeted websites in the United Kingdom and Ukraine. Key sectors affected include water services, energy production, local government, and media. Notable targets include Yorkshire Water, various local government sites, and energy companies, highlighting a focus on critical infrastructure and public services in these regions.AI generated
30 targets are under attack, 10 new targets and 20 targets from previous attack
New Targets(10): www.iskra.zp.ua, www.srdsc.com, www.kza.com.ua, ukrjet.ua, nadu.com.ua, www.test.khadb.kh.ua, vsenergy.com.ua, lemtrans.com.ua, keramet.com.ua, sparing-vist.ua
Targets from prev attack(20): www.yorkshirewater.com, refaiglobal.co.uk, www.yuenergy.co.uk, my.yorkshirewater.com, www.stamfordmercury.co.uk, www.localgoveasteng.gov.uk, redairmedia.co.uk, www.glasgow.gov.uk, www.yorkpress.co.uk, electricityproduction.uk, www.lbc.co.uk, www.doddgroup.com, gkn.com, www.wessexwater.co.uk, scqf.org.uk, www.edinburghdronecompany.co.uk, www.johnrigbyandco.com, www.dundeecity.gov.uk, login.yorkshirewater.com, refaigroup.co.uk
Dismissed Targets(0):
2026-04-10_09-05-08
The attacks attributed to noname057 primarily targeted websites in the United Kingdom. Notable sectors affected include local government, media, and utility services. Key targets include regional news outlets, water companies, and various corporate entities, indicating a focus on critical infrastructure and public services within the UK.AI generated
20 targets are under attack, 0 new targets and 20 targets from previous attack
New Targets(0):
Targets from prev attack(20): www.yorkpress.co.uk, www.wessexwater.co.uk, www.lbc.co.uk, refaigroup.co.uk, www.dundeecity.gov.uk, www.edinburghdronecompany.co.uk, refaiglobal.co.uk, www.doddgroup.com, scqf.org.uk, gkn.com, www.yuenergy.co.uk, electricityproduction.uk, www.stamfordmercury.co.uk, www.localgoveasteng.gov.uk, www.glasgow.gov.uk, login.yorkshirewater.com, www.yorkshirewater.com, my.yorkshirewater.com, redairmedia.co.uk, www.johnrigbyandco.com
Dismissed Targets(2): www.stirling.gov.uk, www.port-of-felixstowe.co.uk
2026-04-10_08-10-11
The attacks attributed to noname057 primarily targeted websites in the United Kingdom, including various sectors such as local government, utilities, and media. Notable sites affected include those of Yorkshire Water, Dundee City Council, and multiple regional news outlets. The attacks highlight a concentrated effort against UK-based organizations, particularly in public service and infrastructure domains.AI generated
22 targets are under attack, 20 new targets and 2 targets from previous attack
New Targets(20): refaiglobal.co.uk, login.yorkshirewater.com, www.johnrigbyandco.com, www.stamfordmercury.co.uk, www.edinburghdronecompany.co.uk, www.dundeecity.gov.uk, www.localgoveasteng.gov.uk, www.lbc.co.uk, my.yorkshirewater.com, www.glasgow.gov.uk, gkn.com, redairmedia.co.uk, www.yuenergy.co.uk, www.yorkshirewater.com, refaigroup.co.uk, www.wessexwater.co.uk, electricityproduction.uk, www.yorkpress.co.uk, scqf.org.uk, www.doddgroup.com
Targets from prev attack(2): www.stirling.gov.uk, www.port-of-felixstowe.co.uk
Dismissed Targets(20): qualifications.wales, www.sport.wales, arts.wales, cadw.gov.wales, www.grawe.ua, www.visitmidwales.co.uk, www.scottish-enterprise.com, askods.com, alfagarant.com, learnwelsh.cymru, skveles.kiev.ua, senedd.wales, www.busin.com.ua, businesswales.gov.wales, museum.wales, www.historicenvironment.scot, naturalresources.wales, insurance.vidi.ua, velta.kiev.ua, www.aska-life.com.ua