From recent cybersecurity reports on the pro-Russian hacktivist group NoName057(16), known for its DDoS attacks supporting Russia's geopolitical interests. Active since Russia's invasion of Ukraine in 2022, the group escalated operations in 2024-2025, targeting entities opposing Russia, particularly in the EU and Ukraine. A major international takedown operation, codenamed Eastwood, disrupted their infrastructure on July 15-17, 2025, involving 12 countries, Europol, and Eurojust. This led to arrests, warrants, and server seizures, effectively dismantling their botnet. Reports from Recorded Future and law enforcement highlight the campaign's scale: over 3,700 unique hosts targeted in 13 months (July 1, 2024, to July 14, 2025), with an average of 50 attacks per day. While no widespread data breaches occurred, the attacks disrupted critical infrastructure during key events like EU elections and NATO summits.Key facts from reports:
Aspect | Details | Key Stats/Examples |
---|---|---|
Campaign Scale | 13 months (July 2024-July 2025); 50 unique targets/day average. | 3,776 unique hosts; peak 91/day. |
Top Targets | Ukraine (29.47%), France (6.09%), Italy (5.39%), Sweden (5.29%); EU gov/public sector primary. | Germany: 14 attacks on 230 orgs (arms, power). |
Tools/Methods | DDoSia (Go-based client); botnet with 4,000 users, multi-tier C2 servers. | Volunteer recruitment via Telegram; encrypted target lists. |
Takedown Actions | Operation Eastwood (July 15-17, 2025): 2 arrests, 7 warrants, 24 searches, 100+ servers disrupted. | Involved 12 countries + EU agencies; warnings to 1,100 supporters. |
Impact & Response | Disrupted critical infra during events; no data loss. Group vows to continue. | Reduced immediate threats; enhanced international cooperation. |
This incident underscores the geopolitical nature of hacktivism, with NoName057(16) shifting focus from Ukraine to EU supporters. For mitigation, organizations should enhance DDoS protections (e.g., CDN scrubbing, rate limiting) and monitor Telegram for emerging threats. If you need deeper analysis on specific attacks or IOCs, provide more details!