Article Details
Scrape Timestamp (UTC): 2025-07-16 14:12:27.358
Original Article Text
Click to Toggle View
Europol disrupts pro-Russian NoName057(16) DDoS hacktivist group. An international law enforcement operation dubbed "Operation Eastwood" has targeted the infrastructure and members of the pro-Russian hacktivist group NoName057(16), responsible for distributed denial-of-service (DDoS) attacks across Europe, Israel, and Ukraine. Operation Eastwood was led by Europol and Eurojust with support from 12 countries. It took place on July 15, 2025, and targeted the systems and individuals behind the group's activities. NoName057(16) is a pro-Russian hacking group that launched in March 2022 after the war in Ukraine began. To conduct attacks, the group uses Telegram channels and the "DDoSia" project, software that runs on volunteers' computers to crowdsource DDoS attacks on targets selected by the threat actors. Since then, NoName057(16) and its supporters have carried out DDoS attacks against companies and critical infrastructure in European countries that support Ukraine. These targets include NATO sites, government agencies, transportation services, banks, defense firms, media outlets, and energy suppliers. According to Europol, the attacks disrupted critical services in Germany, Poland, Lithuania, Latvia, Estonia, Sweden, the Netherlands, and other countries. "The hacktivist group has executed 14 attacks in Germany, some of them lasting multiple days and affecting around 230 organisations including arms factories, power suppliers and government organisations," reads a statement from Eurojust. "Attacks were also executed across Europe during the European elections. In Sweden, authorities and bank websites were targeted, while in Switzerland multiple attacks were carried out during a video message given by the Ukrainian President to the Joint Parliament in June 2023, and during the Peace Summit for Ukraine in June 2024." "Most recently, the Netherlands was targeted during the NATO Summit at the end of June." On July 15, law enforcement agencies conducted searches in Germany, Latvia, Spain, Italy, Czechia, Poland, and France, with more than 100 servers hosting the group's infrastructure disrupted or taken offline. Two arrests have been made as part of this operation (1 preliminary arrest in France and 1 in Spain), and seven European arrest warrants were issued, including six by Germany and one by Spain. The authorities also sent Telegram messages to 1,100 participants and 17 administrators, warning them that they were facing criminal liability for their actions. Six of the warrants issued by Germany are for individuals believed to be residing in Russia, with two of them suspected of being the primary operators of the group. The operation involved law enforcement from Czechia, Estonia, Finland, France, Germany, Latvia, Lithuania, the Netherlands, Poland, Spain, Sweden, Switzerland, and the United States. Authorities claim that Operation Eastwood is a significant blow to NoName057(16). However, with the core members located in Russia, this action is likely to have only a short-lived effect, as the threat actors will likely rebuild their infrastructure. As of today, the threat actors continue to announce new attacks and breaches of German companies. 8 Common Threats in 2025 While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques. Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.
Daily Brief Summary
The pro-Russian NoName057(16) hacking group, known for launching DDoS attacks, was targeted in an extensive law enforcement operation named "Operation Eastwood."
Europol and Eurojust led the operation with collaborative efforts from 12 countries, including the USA and multiple European nations.
The operation resulted in the disruption of over 100 servers used by NoName057(16), with primary actions conducted on July 15, 2025.
Targets of NoName057(16) span across Europe and Israel, affecting NATO sites, government agencies, and critical infrastructure sectors.
Two individuals were arrested, and seven European arrest warrants were issued, focusing on those believed to be core members and administrators of the group.
Authorities extended their reach to warn approximately 1,100 participants and 17 administrators of the group through Telegram messages, about their potential criminal liability.
Despite significant setbacks to NoName057(16), Europol indicates that due to core members residing in Russia, the group might soon recover and continue their operations.