THE AMERICA ONE NEWS
Jul 19, 2025  |  
0
 | Remer,MN
Sponsor:  QWIKET 
Sponsor:  QWIKET 
Sponsor:  QWIKET: Elevate your fantasy game! Interactive Sports Knowledge.
Sponsor:  QWIKET: Elevate your fantasy game! Interactive Sports Knowledge and Reasoning Support for Fantasy Sports and Betting Enthusiasts.
back  
topic
Yuri Zoria


Europol dismantles pro-Russian cyber army flooding Ukraine and its allies with attacks

A coordinated crackdown wiped out over 100 systems tied to Kremlin-backed NoName057(16) hackers.
europol dismantles pro-russian cyber army flooding ukraine its allies attacks flickr/world's direction crime cyberattack hackers coordinated crackdown wiped out over 100 systems tied kremlin-backed noname057(16) global law enforcement campaign has
Illustrative image: Flickr/World’s Direction
Europol dismantles pro-Russian cyber army flooding Ukraine and its allies with attacks

A global law enforcement campaign has dealt a blow to the pro-Russian cyber army known as NoName057(16). Europol confirmed that about 20 countries helped dismantle the network behind thousands of attacks on Ukraine’s supporters.

Russia’s massive cyberattacks against Ukraine escalated shortly before the full-scale invasion in 2022. Since November 2023, Germany has documented recurring attacks tied to NoName057(16). Investigators also linked the group to incidents in 2023 and 2024 that targeted Ukrainian diplomatic efforts. While Ukraine remains a central target, the group increasingly strikes at Kyiv’s allies. These include several NATO and EU members actively supporting Ukraine’s defense against the Russian war of aggression.

Europol targets ideological cyber group tied to Russia’s war

Europol reported that between 14 and 17 July, authorities from 12 countries launched Operation Eastwood. Europol and Eurojust coordinated the joint crackdown. The effort reportedly dismantled major parts of the pro-Russian cyber army’s infrastructure, including hundreds of systems.

The network, NoName057(16), had attacked Ukraine and NATO member states. It used distributed denial-of-service (DDoS) attacks to flood websites and services with traffic. These cyber strikes targeted public services, including defense, government, energy, and financial infrastructure.

Germany issued six arrest warrants for suspects based in Russia. Two are accused of leading the group’s activities. Spain issued another arrest warrant. France and Spain also reported one arrest each. All suspects are internationally wanted.

Authorities carried out 24 house searches and questioned 13 individuals across Europe. In Spain alone, 12 searches took place. Investigators also notified over 1,000 individuals believed to support the cyber group. Fifteen of them were administrators.

Attacks tied to political and military events across Europe

Europol reports that the group’s cyberattacks were timed to coincide with high-profile political moments. In Germany, authorities experienced 14 separate attack waves since November 2023, affecting more than 250 institutions. Targets included arms factories, energy companies, and government agencies.

Other attacks struck during the European elections. Swedish government and banking websites were affected. In Switzerland, NoName057(16) launched attacks in June 2023, during a speech by Ukraine’s president to the Joint Parliament. Another wave occurred in June 2024 during the Peace Summit for Ukraine at Bürgenstock.

The most recent attack linked to the group targeted the NATO summit held in the Netherlands in June 2025. Europol notes that although the attacks caused disruption attempts, none led to substantial outages.

Recruitment tactics built on crypto rewards and gamified propaganda

Europol identifies NoName057(16) as an ideological cyber network that operated without formal leadership. The group recruited mostly Russian-speaking sympathizers, many with little technical knowledge. Its structure relied heavily on gamified propaganda and incentives.

Volunteers received cryptocurrency payments and recognition through online shout-outs, badges, and leaderboards. Europol notes this method especially appealed to younger users who felt emotionally involved in Russia’s political narratives.

The group used pro-Russian forums, messaging apps, and gaming channels to recruit and coordinate. Europol says it also developed its own botnet made up of several hundred servers. These were used to amplify DDoS attacks against selected targets.

To simplify participation, NoName057(16) distributed guides and tools like DDoSia. Europol also launched a prevention campaign warning suspected supporters of their criminal liability, delivered via the same communication platforms.