Disruption of Pro-Russian Hacktivist Group NoName057(16): A Closer Look
Overview of the Operation
An extensive international effort led by Europol has successfully undermined the operations of the pro-Russian hacktivist collective known as NoName057(16). This group is notorious for executing numerous distributed denial-of-service (DDoS) attacks aimed at Ukraine and its allies. The coordinated crackdown resulted in the dismantling of a significant portion of the group’s central server infrastructure and over 100 systems scattered across various countries.
Details of Operation Eastwood
Codenamed Operation Eastwood, the initiative unfolded between July 14 and July 17, involving authorities from multiple nations, including Czechia, France, Germany, Italy, Poland, Spain, and the United States, among others. The operation not only led to the arrest of two individuals in France and Spain but also included searches conducted across two dozen residences in countries such as Germany, Italy, and the Czech Republic. Additionally, arrest warrants were issued for six Russian nationals.
The Role of NoName057(16)
Established in March 2022, NoName057(16) has positioned itself as a pro-Kremlin group that capitalizes on the political climate following Russia’s invasion of Ukraine. Utilizing the instant messaging platform Telegram, the group mobilizes supporters to conduct DDoS attacks by employing a program termed DDoSia. The attackers are incentivized through payments made in cryptocurrency, ensuring a steady stream of recruits willing to participate in these cyber offensives.
Arrests and Investigations
In conjunction with Europol’s operation, five individuals from Russia have been added to the EU’s Most Wanted list for their alleged affiliations with NoName057(16). Among these are:
- Andrey Muravyov (alias DaZBastaDraw)
- Maxim Nikolaevich Lupin (alias s3rmax)
- Olga Evstratova (aliases: olechochek, olenka)
- Mihail Evgeyevich Burlakov (aliases: Ddosator3000, darkklogo)
- Andrej Stanislavovich Avrosimow (alias: ponyaska)
Authorities suspect Burlakov to be a key player in organizing numerous DDoS attacks against various institutions in Germany and beyond. His role reportedly involved making critical decisions concerning software development for attack execution. Similarly, Evstratova is implicated in optimizing the DDoSia software, while Avrosimow faces allegations related to 83 counts of computer sabotage.
Reaching Out to Supporters
Europol has proactively contacted over 1,000 individuals believed to be supporting the no-name cybercrime network, notifying them of the legal repercussions associated with their actions in orchestrating DDoS attacks using automated tools. The group is estimated to have around 4,000 supporters and has constructed a botnet composed of several hundred servers to amplify their attack capabilities.
The Gamification of Cybercrime
One notable aspect of NoName057(16)’s operations is its strategic use of gamification to recruit younger participants. By integrating elements such as leaderboards, shout-outs, and badges, the group has created a competitive environment that appeals to potential recruits. This approach not only fosters a sense of community but also frames their activities as part of a larger narrative defending Russia from perceived threats.
Recent Attack Trends
In recent years, NoName057(16) has targeted a variety of entities, including Swedish authorities and banking websites. Reports indicate they have successfully launched attacks against 250 German companies and institutions between November 2022 and early 2023 through 14 separate waves of assault. In July, Spanish law enforcement apprehended three suspected members for their involvement in denial-of-service attacks targeting public institutions and key sectors in Spain and other NATO countries.
Evolving Tactics of Russian Hacktivism
As cyber threats evolve, hacktivist groups like NoName057(16) are expanding their scope of operations. Recent activities suggest a shift in focus toward critical infrastructure and coordinated attacks that extend beyond traditional DDoS strikes and website defacements. Cybersecurity analysts have noted a concerning trend of collaborated efforts among Russian groups, indicating a unified strategy aimed at achieving broader, politically-motivated cyber objectives.
Conclusion
The disruption of NoName057(16) marks a significant development in the ongoing efforts to combat cybercrime linked to geopolitical conflicts. The international collaboration not only highlights the coordinated approach needed to tackle sophisticated cyber threats but also reflects the growing need for vigilance in cybersecurity as hacktivism continues to evolve.


