Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide

Posted on July 17, 2025July 17, 2025 By CWS

A coordinated worldwide cybercrime operation efficiently dismantled the pro-Russian hacking community NoName057(16), taking down over 100 servers worldwide and disrupting their central assault infrastructure. 

The joint operation, dubbed “Eastwood,” coordinated by Europol concerned 12 nations and resulted in a number of arrests, warrants, and the neutralization of a classy distributed denial-of-service (DDoS) assault community that had been focusing on Ukraine and its NATO allies.

Key Takeaways1. 12 nations dismantled the pro-Russian group NoName057(16).2.  100+ servers offline, 2 arrests, 7 warrants issued.3. Gamified DDoS assaults with 4,000+ supporters.

The technical features of the operation had been bolstered by non-public sector partnerships with ShadowServer and abuse.ch, demonstrating the vital significance of public-private collaboration in cybersecurity operations. 

Germany issued six arrest warrants for Russian nationals, figuring out two people as the first instigators behind NoName057(16)’s actions. 

The operation resulted in two preliminary arrests in France and Spain, 24 home searches throughout a number of nations, and the questioning of 13 people linked to the community.

DDoS Assaults Goal Ukraine Supporters 

NoName057(16) operated as an ideological legal community supporting the Russian Federation, using subtle recruitment and motivation strategies to construct a community of over 4,000 supporters. 

The group employed gamified manipulation ways, together with cryptocurrency funds, leaderboards, and badge methods to incentivize sustained participation in DDoS assaults towards Ukrainian infrastructure and NATO member nations supporting Ukraine.

The cybercriminals leveraged platforms like DDoSia to simplify technical processes and supply operational pointers, enabling fast recruitment and deployment of latest attackers.

These distributed denial-of-service assaults concerned flooding goal web sites and on-line providers with visitors to render them unavailable. 

The community constructed its personal botnet comprising a number of hundred servers to amplify assault capabilities past particular person volunteer contributions.

The operation’s success stemmed from in depth worldwide coordination, with Europol facilitating over 30 conferences and two operational sprints whereas offering cryptocurrency tracing and forensic experience. 

Nationwide authorities reached out to over 1,000 suspected supporters by messaging functions, informing them of potential legal legal responsibility beneath nationwide laws.

Current assaults linked to NoName057(16) included focusing on Swedish authorities and banking web sites in 2023-2024, over 250 German firms and establishments throughout 14 assault waves, and disruption makes an attempt through the Ukrainian Peace Summit at Bürgenstock and the NATO summit within the Netherlands. 

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Disrupted, Europol, Groups, Hacking, Infrastructure, NoName05716, Servers, Worldwide

Post navigation

Previous Post: VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
Next Post: Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure

Related Posts

Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News
Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Cyber Security News
DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News