Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide

Posted on July 17, 2025July 17, 2025 By CWS

A coordinated worldwide cybercrime operation efficiently dismantled the pro-Russian hacking community NoName057(16), taking down over 100 servers worldwide and disrupting their central assault infrastructure. 

The joint operation, dubbed “Eastwood,” coordinated by Europol concerned 12 nations and resulted in a number of arrests, warrants, and the neutralization of a classy distributed denial-of-service (DDoS) assault community that had been focusing on Ukraine and its NATO allies.

Key Takeaways1. 12 nations dismantled the pro-Russian group NoName057(16).2.  100+ servers offline, 2 arrests, 7 warrants issued.3. Gamified DDoS assaults with 4,000+ supporters.

The technical features of the operation had been bolstered by non-public sector partnerships with ShadowServer and abuse.ch, demonstrating the vital significance of public-private collaboration in cybersecurity operations. 

Germany issued six arrest warrants for Russian nationals, figuring out two people as the first instigators behind NoName057(16)’s actions. 

The operation resulted in two preliminary arrests in France and Spain, 24 home searches throughout a number of nations, and the questioning of 13 people linked to the community.

DDoS Assaults Goal Ukraine Supporters 

NoName057(16) operated as an ideological legal community supporting the Russian Federation, using subtle recruitment and motivation strategies to construct a community of over 4,000 supporters. 

The group employed gamified manipulation ways, together with cryptocurrency funds, leaderboards, and badge methods to incentivize sustained participation in DDoS assaults towards Ukrainian infrastructure and NATO member nations supporting Ukraine.

The cybercriminals leveraged platforms like DDoSia to simplify technical processes and supply operational pointers, enabling fast recruitment and deployment of latest attackers.

These distributed denial-of-service assaults concerned flooding goal web sites and on-line providers with visitors to render them unavailable. 

The community constructed its personal botnet comprising a number of hundred servers to amplify assault capabilities past particular person volunteer contributions.

The operation’s success stemmed from in depth worldwide coordination, with Europol facilitating over 30 conferences and two operational sprints whereas offering cryptocurrency tracing and forensic experience. 

Nationwide authorities reached out to over 1,000 suspected supporters by messaging functions, informing them of potential legal legal responsibility beneath nationwide laws.

Current assaults linked to NoName057(16) included focusing on Swedish authorities and banking web sites in 2023-2024, over 250 German firms and establishments throughout 14 assault waves, and disruption makes an attempt through the Ukrainian Peace Summit at Bürgenstock and the NATO summit within the Netherlands. 

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Disrupted, Europol, Groups, Hacking, Infrastructure, NoName05716, Servers, Worldwide

Post navigation

Previous Post: VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
Next Post: Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure

Related Posts

EV Charging Provider Confirm Data Breach Cyber Security News
Massive Phishing Attack Impersonate as Travel Brands Attacking Users with 4,300 Malicious Domains Cyber Security News
Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams Cyber Security News
Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT Cyber Security News
Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments Cyber Security News
Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark