Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

US Indicts Extradited Ukrainian on Charges of Aiding Russian Hacking Groups

Posted on December 10, 2025December 11, 2025 By CWS

A Ukrainian girl was charged within the US in two separate indictments for her alleged ties with two hacktivist teams recognized for launching lots of of cyberattacks in help of the Russian authorities’s pursuits.

The person, Victoria Eduardovna Dubranova, 33, allegedly performed a job in cyberattacks and intrusions that pro-Russia hacktivist teams CyberArmyofRussia_Reborn (CARR) and NoName057(16) (NoName) carried out in opposition to vital infrastructure organizations worldwide.

Dubranova faces as much as 27 years in jail for her involvement in CARR actions, and as much as 5 years in jail for her ties to NoName.

The girl was extradited to america earlier this yr and he or she has pleaded not responsible in each circumstances.

The primary indictment alleges that CARR, also referred to as Z-Pentest, was based, supported financially, and supervised by Russia’s navy intelligence unit GRU.

CARR commonly claimed duty for cyberattacks in opposition to vital infrastructure entities, together with US organizations, and is thought for hacking industrial management methods (ICS) and for launching distributed denial-of-service (DDoS) assaults.

In keeping with a joint advisory from authorities businesses within the US and allied nations, CARR, also referred to as The Folks’s Cyber Military of Russia, was created in late February or early March of 2022, and carried out DDoS assaults till at the very least September 2024.

Presenting itself as a pro-Russia hacktivist group, CARR documented its cyberattacks by means of photos and movies shared on-line, promoted Russian ideology, and publicized leaked info from Russian state-sponsored intrusions.Commercial. Scroll to proceed studying.

The group is blamed for hacking a meat processing facility in Los Angeles in November 2024, for concentrating on the US election infrastructure, the web sites of US nuclear regulatory entities, and a water system in Texas.

On Tuesday, the US introduced rewards of as much as $2 million for info on people related to CARR, together with its self-proclaimed administrator Yuliya Vladimirovna Pankratova (also referred to as YUliYA), and its major hacker Denis Olegovich Degtyarenko (also referred to as Dena).

Moreover, the US says, the menace actor ‘Cyber_1ce_Killer’, a moniker related to at the very least one GRU officer, is a member of CARR.

NoName launched over 1,500 DDoS assaults

The second indictment in opposition to Dubranova alleges her involvement with NoName, a hacktivist group energetic since March 2022 and recognized for launching DDoS assaults in opposition to NATO member states and different European nations.

In keeping with the indictment, NoName has launched assaults in opposition to authorities businesses, monetary establishments, and important infrastructure, and has recruited volunteers worldwide to obtain its proprietary DDoS device known as DDoSia.

“In 2024, NoName057(16) started collaborating carefully with different pro-Russia hacktivist teams, working a joint chat with CARR by mid-2024. In July 2024, NoName057(16) collectively claimed duty with CARR for an alleged intrusion in opposition to OT property within the US,” the federal government businesses’ joint advisory reads.

On Tuesday, the US introduced it was providing bounties of as much as $10 million for info on members of NoName, that are carefully aligned with the Russian info know-how group referred to as the Middle for the Research and Community Monitoring of the Youth Atmosphere (CISM).

NoName, the US says, is believed to have launched over 1,500 DDoS assaults in opposition to organizations in Ukraine and its neighboring and supporting nations.

The joint advisory from the US and its allies additionally exhibits that Z-Pentest, which is thought for assaults on ICS/OT methods, was created in September 2024 by members from CARR and NoName who have been dissatisfied with the extent of help acquired from GRU.

A novice pro-Russia hacktivist group named Sector16 that emerged this yr by means of collaboration with Z-Pentest may need acquired oblique help from the Russian authorities, the advisory exhibits.

Associated: Reporters With out Borders Focused by Russian Hackers

Associated: RapperBot Botnet Disrupted, American Administrator Indicted

Associated: Russian Qakbot Gang Chief Indicted in US

Associated: UK Sanctions Russian and Chinese language Companies Suspected of Being ‘Malign Actors’ in Data Warfare

Security Week News Tags:Aiding, Charges, Extradited, Groups, Hacking, Indicts, Russian, Ukrainian

Post navigation

Previous Post: Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
Next Post: What’s Next for SOC in 2026: Get the Early-Adopter Advantage 

Related Posts

New Exploit Poses Threat to SAP NetWeaver Instances Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
Chrome, Edge Extensions Caught Tracking Users, Creating Backdoors Security Week News
Zscaler Acquires AI Security Company SPLX Security Week News
CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks Security Week News
SAP Patches Critical Flaws in SQL Anywhere Monitor, Solution Manager Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
  • Trump Signs Executive Order to Block State AI Regulations
  • New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
  • CISA Warns of OSGeo GeoServer 0-Day Vulnerability Exploited in Attacks
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
  • Trump Signs Executive Order to Block State AI Regulations
  • New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark