A coordinated worldwide cybercrime operation efficiently dismantled the pro-Russian hacking community NoName057(16), taking down over 100 servers worldwide and disrupting their central assault infrastructure.
The joint operation, dubbed “Eastwood,” coordinated by Europol concerned 12 nations and resulted in a number of arrests, warrants, and the neutralization of a classy distributed denial-of-service (DDoS) assault community that had been focusing on Ukraine and its NATO allies.
Key Takeaways1. 12 nations dismantled the pro-Russian group NoName057(16).2. 100+ servers offline, 2 arrests, 7 warrants issued.3. Gamified DDoS assaults with 4,000+ supporters.
The technical features of the operation had been bolstered by non-public sector partnerships with ShadowServer and abuse.ch, demonstrating the vital significance of public-private collaboration in cybersecurity operations.
Germany issued six arrest warrants for Russian nationals, figuring out two people as the first instigators behind NoName057(16)’s actions.
The operation resulted in two preliminary arrests in France and Spain, 24 home searches throughout a number of nations, and the questioning of 13 people linked to the community.
DDoS Assaults Goal Ukraine Supporters
NoName057(16) operated as an ideological legal community supporting the Russian Federation, using subtle recruitment and motivation strategies to construct a community of over 4,000 supporters.
The group employed gamified manipulation ways, together with cryptocurrency funds, leaderboards, and badge methods to incentivize sustained participation in DDoS assaults towards Ukrainian infrastructure and NATO member nations supporting Ukraine.
The cybercriminals leveraged platforms like DDoSia to simplify technical processes and supply operational pointers, enabling fast recruitment and deployment of latest attackers.
These distributed denial-of-service assaults concerned flooding goal web sites and on-line providers with visitors to render them unavailable.
The community constructed its personal botnet comprising a number of hundred servers to amplify assault capabilities past particular person volunteer contributions.
The operation’s success stemmed from in depth worldwide coordination, with Europol facilitating over 30 conferences and two operational sprints whereas offering cryptocurrency tracing and forensic experience.
Nationwide authorities reached out to over 1,000 suspected supporters by messaging functions, informing them of potential legal legal responsibility beneath nationwide laws.
Current assaults linked to NoName057(16) included focusing on Swedish authorities and banking web sites in 2023-2024, over 250 German firms and establishments throughout 14 assault waves, and disruption makes an attempt through the Ukrainian Peace Summit at Bürgenstock and the NATO summit within the Netherlands.
Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now