Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine

Posted on July 17, 2025July 17, 2025 By CWS

A world operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group often known as NoName057(16) that has been linked to a string of distributed denial-of-service (DDoS) assaults towards Ukraine and its allies.
The actions have led to the dismantling of a serious a part of the group’s central server infrastructure and greater than 100 methods the world over. The joint effort additionally included two arrests in France and Spain, searches of two dozen houses in Spain, Italy, Germany, the Czech Republic, France and Poland, and the issuance of arrest warrants for six Russian nationals.
The hassle, codenamed Operation Eastwood, happened between July 14 and 17, and concerned authorities from Czechia, France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Netherlands, and the US. The investigation was additionally supported by Belgium, Canada, Estonia, Denmark, Latvia, Romania and Ukraine.

NoName057(16) has been operational since March 2022, performing as a pro-Kremlin collective that mobilizes ideologically motivated sympathizers on Telegram to launch DDoS assaults towards web sites utilizing a particular program known as DDoSia in alternate for a cryptocurrency fee in an effort to maintain them incentivized. It sprang up shortly after Russia’s invasion of Ukraine.
5 people from Russia have been added to the E.U. Most Needed record for allegedly supporting NoName57(16) –

Andrey Muravyov (aka DaZBastaDraw)
Maxim Nikolaevich Lupin (aka s3rmax)
Olga Evstratova (aka olechochek, olenka)
Mihail Evgeyevich Burlakov (aka Ddosator3000, darkklogo)
Andrej Stanislavovich Avrosimow (aka ponyaska)

“BURLAKOV is suspected of being a central member of the group ‘NoName057(16)’ and as such of getting made a big contribution to performing DDoS assaults on numerous establishments in Germany and different nations,” in response to an outline posted on the Most Needed fugitives website.

“Particularly, he’s suspected of assuming a number one function inside the group beneath the pseudonym ‘darkklogo’ and on this function of getting taken choices together with on the event and additional optimisation of software program for the strategic identification of targets and for growing the assault software program, in addition to having executed funds referring to renting illicit servers.”
Evstratova, additionally believed to be a core member of the group, has been accused of taking up tasks to optimize the DDoSia assault software program. Avrosimow has been attributed to 83 circumstances of laptop sabotage.
Europol stated officers have reached out to greater than 1,000 people who’re believed to be supporters of the cybercrime community, notifying them of the felony legal responsibility they bear for orchestrating DDoS assaults utilizing automated instruments.
“Along with the actions of the community, estimated at over 4,000 supporters, the group was additionally in a position to assemble their very own botnet made up of a number of hundred servers, used to extend the assault load,” Europol famous.
“Mimicking game-like dynamics, common shout-outs, leaderboards, or badges supplied volunteers with a way of standing. This gamified manipulation, usually focused at youthful offenders, was emotionally bolstered by a story of defending Russia or avenging political occasions.”

In recent times, menace actors have been noticed staging a sequence of assaults aimed toward Swedish authorities and financial institution web sites, in addition to towards 250 firms and establishments in Germany over the course of 14 separate waves since November 2023.
Final July, Spain’s La Guardia Civil arrested three suspected members of the group for collaborating in “denial-of-service cyber assaults towards public establishments and strategic sectors of Spain and different NATO nations.”
The event comes as Russian hacktivist teams like Z-Pentest, Darkish Engine, and Sector 16 are more and more coaching their sights on vital infrastructure, going past DDoS assaults and web site defacements which can be sometimes related to ideologically motivated cyber assaults.
“The teams have aligned messaging, coordinated timing, and shared concentrating on priorities, suggesting deliberate collaboration supporting Russian strategic cyber aims,” Cyble stated.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, DDoS, Disrupts, Europol, Group, Hacktivist, Linked, NoName05716, Ukraine

Post navigation

Previous Post: What Security Leaders Need to Know in 2025
Next Post: Mobile Forensics Tool Used by Chinese Law Enforcement Dissected

Related Posts

Transforming Your Cybersecurity Practice Into An MRR Machine The Hacker News
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs The Hacker News
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises The Hacker News
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access The Hacker News
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News
Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
  • Empirical Security Raises $12 Million for AI-Driven Vulnerability Management
  • NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution
  • Armenian Man Extradited to US Over Ryuk Ransomware Attacks
  • 1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
  • Empirical Security Raises $12 Million for AI-Driven Vulnerability Management
  • NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution
  • Armenian Man Extradited to US Over Ryuk Ransomware Attacks
  • 1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News