Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide

Posted on July 17, 2025July 17, 2025 By CWS

A coordinated worldwide cybercrime operation efficiently dismantled the pro-Russian hacking community NoName057(16), taking down over 100 servers worldwide and disrupting their central assault infrastructure. 

The joint operation, dubbed “Eastwood,” coordinated by Europol concerned 12 nations and resulted in a number of arrests, warrants, and the neutralization of a classy distributed denial-of-service (DDoS) assault community that had been focusing on Ukraine and its NATO allies.

Key Takeaways1. 12 nations dismantled the pro-Russian group NoName057(16).2.  100+ servers offline, 2 arrests, 7 warrants issued.3. Gamified DDoS assaults with 4,000+ supporters.

The technical features of the operation had been bolstered by non-public sector partnerships with ShadowServer and abuse.ch, demonstrating the vital significance of public-private collaboration in cybersecurity operations. 

Germany issued six arrest warrants for Russian nationals, figuring out two people as the first instigators behind NoName057(16)’s actions. 

The operation resulted in two preliminary arrests in France and Spain, 24 home searches throughout a number of nations, and the questioning of 13 people linked to the community.

DDoS Assaults Goal Ukraine Supporters 

NoName057(16) operated as an ideological legal community supporting the Russian Federation, using subtle recruitment and motivation strategies to construct a community of over 4,000 supporters. 

The group employed gamified manipulation ways, together with cryptocurrency funds, leaderboards, and badge methods to incentivize sustained participation in DDoS assaults towards Ukrainian infrastructure and NATO member nations supporting Ukraine.

The cybercriminals leveraged platforms like DDoSia to simplify technical processes and supply operational pointers, enabling fast recruitment and deployment of latest attackers.

These distributed denial-of-service assaults concerned flooding goal web sites and on-line providers with visitors to render them unavailable. 

The community constructed its personal botnet comprising a number of hundred servers to amplify assault capabilities past particular person volunteer contributions.

The operation’s success stemmed from in depth worldwide coordination, with Europol facilitating over 30 conferences and two operational sprints whereas offering cryptocurrency tracing and forensic experience. 

Nationwide authorities reached out to over 1,000 suspected supporters by messaging functions, informing them of potential legal legal responsibility beneath nationwide laws.

Current assaults linked to NoName057(16) included focusing on Swedish authorities and banking web sites in 2023-2024, over 250 German firms and establishments throughout 14 assault waves, and disruption makes an attempt through the Ukrainian Peace Summit at Bürgenstock and the NATO summit within the Netherlands. 

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Disrupted, Europol, Groups, Hacking, Infrastructure, NoName05716, Servers, Worldwide

Post navigation

Previous Post: VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
Next Post: Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure

Related Posts

Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News
Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
Why Threat Prioritization Is the Key SOC Performance Driver   Cyber Security News
What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak
  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak
  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark