logo
#

Latest news with #NoName057

Pro-Russia cybercrime network targeted by European law enforcement

time17-07-2025

  • Politics

Pro-Russia cybercrime network targeted by European law enforcement

LONDON -- Law enforcement officials in Europe said they had coordinated the dismantling of an international pro-Russian cybercrime network, arresting two members, issuing warrants for others in Russia and disrupting the group's main infrastructure. The network, known as NoName057(16), was alleged to have targeted Ukraine and countries that supported Kyiv in its fight against the Russian invasion, Europol said in a statement Wednesday. The group was alleged to have recruited volunteers via "pro-Russian channels, forums, and even niche chat groups on social media and messaging apps." "Individuals acting for NoName057(16) are mainly Russian-speaking sympathisers who use automated tools to carry out distributed denial-of-service (DDoS) attacks," Europol said in a statement. Two people were arrested, one in France and one in Spain, officials said of the 3-day operation. Seven other arrest warrants were issued, including six by Germany for alleged hackers living in Russia, Europol said. "The group, which professed support for the Russian Federation since the start of the war of aggression against Ukraine, executed multiple DDoS attacks during high-level political events in Europe," the European Union Agency for Criminal Justice Cooperation, or Eurojust, said in a statement posted to social media. The FBI in the United States was among the law enforcement agencies who took action against the group, Europol said. Europol and Eurojust, the European Union's top law-enforcement agencies, coordinated the operation, which they called "Eastwood." They were joined by authorities from Czechia, France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland and the Netherlands. The hacking group was estimated to have mobilized some 4,000 users to support their operations, Eurojust said. Europol and other law enforcement agencies sent some 1,000 alleged supporters messages notifying them of "their legal liability," Europol said. Investigators said they disrupted more than 100 servers used by the group, along with a "major part" of the group's main infrastructure. Law enforcement officers searched two dozen houses throughout Europe and questioned people in Germany, France, Italy, Poland and Spain, according to Europol. The pro-Russian group was accused of a series of hacks, including attacking banks and government offices in Sweden, along with perpetrating waves of cyber attacks in Germany and elsewhere. The attacks in Germany targeted some 230 organizations and businesses, including 'arms factories, power suppliers and government organizations,' according to Eurojust. "In Switzerland, multiple attacks were also carried out in June 2023, during a Ukrainian video-message addressed to the Joint Parliament, and in June 2024, during the Peace Summit for Ukraine at Bürgenstock," Europol said.

Europol-coordinated global operation takes down pro-Russian cybercrime network
Europol-coordinated global operation takes down pro-Russian cybercrime network

Japan Today

time16-07-2025

  • Politics
  • Japan Today

Europol-coordinated global operation takes down pro-Russian cybercrime network

Law enforcement agencies from Europe and North America targeted a cybercrime network launching online attacks against Ukraine and its allies. (AP Graphic) By MIKE CORDER A coordinated international operation has hit the infrastructure of a pro-Russian cybercrime network linked to a string of denial of service attacks targeting Ukraine and its allies, the European Union's police agency Europol announced Wednesday. Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified last month by Dutch authorities as being behind a series of denial-of-service attacks on several municipalities and organizations linked to a NATO summit in the Netherlands. Europol said that the cybercrime network was also involved in attacks in Sweden, Germany and Switzerland. The police agency said the international operation 'led to the disruption of an attack-infrastructure consisting of over one hundred computer systems worldwide, while a major part of the group's central server infrastructure was taken offline.' Law enforcement and judicial authorities from France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Czech Republic, the Netherlands and the United States took simultaneous actions against offenders and infrastructure belonging to the pro-Russian cybercrime network, it said. Western officials have accused Russia and its proxies of staging dozens of attacks, sabotage attempts and other incidents across Europe since the invasion of Ukraine, including cyberattacks. The Associated Press is tracking them in a detailed map that shows the breadth of efforts to sow division in European societies and undermine support for Ukraine. As part of the latest operation, judicial authorities in Germany issued six arrest warrants for suspects in Russia, two of them accused of being the main leaders of the group, Europol said. Five of them were identified on Europol's Europe's Most Wanted website. One suspect was placed under preliminary arrest in France and another detained in Spain, Europol said. The Paris prosecutor's office said one person is in custody in France and communications equipment has been seized. No charges have yet been filed. In the United States, the Federal Bureau of Investigation was involved in the operation. The attorney general's office in Switzerland, which is not an EU member country, said in a statement Wednesday that joint investigations between Europol and Swiss federal police helped identify three leading members of the group, which is alleged to have targeted more than 200 Swiss websites. Swiss prosecutors opened a criminal case over the incidents in June 2023, and since then identified several other denial-of-service attacks attributed to the activist group. The attacks included a video address by Ukrainian President Volodymyr Zelenskyy to the Swiss parliament and the popular Eurovision Song Contest, held in in Basel earlier this year. Europol said members of the cybercrime group initially targeted Ukrainian institutions, 'but have shifted their focus to attacking countries that support Ukraine in the ongoing defence against the Russian war of aggression, many of which are members of NATO.' Law enforcement authorities in countries involved in the operation contacted hundreds of people believed to support the group to inform them of the crackdown and their alleged liability for its actions. 'Individuals acting for NoName057(16) are mainly Russian-speaking sympathisers who use automated tools to carry out distributed denial-of-service (DDoS) attacks. Operating without formal leadership or sophisticated technical skills, they are motivated by ideology and rewards,' Europol said. It added that people recruited by the group were paid in cryptocurrency and motivated using online-gaming dynamics like leader boards and badges. 'This gamified manipulation, often targeted at younger offenders, was emotionally reinforced by a narrative of defending Russia or avenging political events,' Europol said. Associated Press writers Jamey Keaten in Geneva, Geir Moulson in Berlin and Angela Charlton in Paris contributed. © Copyright 2025 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without permission.

Joint global operation takes down pro-Russian hacking group
Joint global operation takes down pro-Russian hacking group

Al Jazeera

time16-07-2025

  • Politics
  • Al Jazeera

Joint global operation takes down pro-Russian hacking group

An international operation spanning North America and Europe has taken down a pro-Russian cybercrime group linked to thousands of attacks on Ukraine and its allies. In recent days, law enforcement working together in 19 countries jointly dismantled the operations of cybercrime network NoName057(16), according to a statement issued by Europol on Wednesday. The pro-Russian group, which has been operating since 2022, initially targeted Ukraine but expanded to countries across Europe. They carried out attacks on Swedish authorities and bank websites, more than 250 German companies and institutions, and on the latest NATO meeting in the Netherlands, Europol said. The police agency said the international operation 'led to the disruption of an attack-infrastructure consisting of over one hundred computer systems worldwide, while a major part of the group's central server infrastructure was taken offline'. Law enforcement and judicial authorities from France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Czech Republic, the Netherlands and the United States took simultaneous actions against offenders and infrastructure belonging to the pro-Russian cybercrime network, it said. The group had used the Telegram messaging app to enlist more than 4,000 volunteers, who made their systems available for swamping critical institutions' servers with so-called distributed denial of service attacks, German prosecutors said. The premises searched included those linked to volunteers in the Telegram group, they said. Judicial authorities in Germany issued six arrest warrants for suspects in Russia, two of them accused of being the main leaders of the group, Europol said. Five of them were identified on Europol's Europe's Most Wanted website. One suspect was placed under preliminary arrest in France and another detained in Spain, Europol said. The Paris prosecutor's office said one person is in custody in France and communications equipment has been seized. No charges have yet been filed. In the United States, the Federal Bureau of Investigation was involved in the operation. The attorney general's office in Switzerland, which is not an EU member country, said in a statement on Wednesday that joint investigations between Europol and Swiss federal police helped identify three leading members of the group, which is alleged to have targeted more than 200 Swiss websites. Swiss prosecutors opened a criminal case over the incidents in June 2023, and since then, identified several other denial-of-service attacks attributed to the activist group. The attacks included a video address by Ukrainian President Volodymyr Zelenskyy to the Swiss parliament and the popular Eurovision Song Contest, held in Basel earlier this year. In recent years, the collective, known for promoting Russian interests, has allegedly carried out successful cyberattacks in Ukraine and on government, infrastructure, banking, health services and telecom websites in European countries that have opposed Russia's invasion. European authorities are increasingly concerned at the scale of the hybrid threats they say emanate from Russia, which is in the third year of its invasion of Western ally Ukraine. Those threats, which have included killings and alleged bomb plots against institutions and cargo aircraft, have largely been attributed to state actors. Russia has denied the accusation. Europol said that people recruited by the group were paid in cryptocurrency and motivated using online-gaming dynamics like leader boards and badges. 'This gamified manipulation, often targeted at younger offenders, was emotionally reinforced by a narrative of defending Russia or avenging political events,' Europol said.

Europol-coordinated global operation takes down pro-Russian cybercrime network

time16-07-2025

  • Politics

Europol-coordinated global operation takes down pro-Russian cybercrime network

THE HAGUE, Netherlands -- A coordinated international operation has hit the infrastructure of a pro-Russian cybercrime network linked to a string of denial of service attacks targeting Ukraine and its allies, the European Union's police agency Europol announced Wednesday. Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified last month by Dutch authorities as being behind a series of denial-of-service attacks on several municipalities and organizations linked to a NATO summit in the Netherlands. Europol said that the cybercrime network also was involved in attacks in Sweden, Germany and Switzerland. The police agency said the international operation 'led to the disruption of an attack-infrastructure consisting of over one hundred computer systems worldwide, while a major part of the group's central server infrastructure was taken offline.' Law enforcement and judicial authorities from France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Czech Republic, the Netherlands and the United States took simultaneous actions against offenders and infrastructure belonging to the pro-Russian cybercrime network, it said. Judicial authorities in Germany issued six arrest warrants for suspects in Russia, two of them accused of being the main leaders of the group, Europol said. Five of them were identified on Europol's Europe's Most Wanted website. One suspect was placed under preliminary arrest in France and another detained in Spain, Europol said. In the United States, the Federal Bureau of Investigation was involved in the operation. The Paris prosecutor's office said one person is in custody in France and communications equipment has been seized. No charges have yet been filed. The attorney general's office in Switzerland, which is not an EU member country, said in a statement Wednesday that joint investigations between Europol and Swiss federal police helped identify three leading members of the group, which is alleged to have targeted more than 200 Swiss websites. Swiss prosecutors opened a criminal case over the incidents in June 2023, and since then identified several other denial-of-service attacks attributed to the activist group. The attacks included a video address by Ukrainian President Volodymyr Zelenskyy to the Swiss parliament and the popular Eurovision Song Contest, held in in Basel earlier this year. Europol said members of the cybercrime group initially targeted Ukrainian institution, 'but have shifted their focus to attacking countries that support Ukraine in the ongoing defence against the Russian war of aggression, many of which are members of NATO.' Law enforcement authorities in countries involved in the operation contacted hundreds of people believed to support the group to inform them of the crackdown and their alleged liability for its actions. 'Individuals acting for NoName057(16) are mainly Russian-speaking sympathisers who use automated tools to carry out distributed denial-of-service (DDoS) attacks. Operating without formal leadership or sophisticated technical skills, they are motivated by ideology and rewards,' Europol said. It added that people recruited by the group were paid in cryptocurrency and motivated using online-gaming dynamics like leader boards and badges. 'This gamified manipulation, often targeted at younger offenders, was emotionally reinforced by a narrative of defending Russia or avenging political events,' Europol said.

Europol-coordinated global operation takes down pro-Russian cybercrime network
Europol-coordinated global operation takes down pro-Russian cybercrime network

Los Angeles Times

time16-07-2025

  • Politics
  • Los Angeles Times

Europol-coordinated global operation takes down pro-Russian cybercrime network

THE HAGUE, Netherlands — A coordinated international operation has hit the infrastructure of a pro-Russian cybercrime network linked to a string of denial of service attacks targeting Ukraine and its allies, the European Union's police agency Europol announced Wednesday. Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified last month by Dutch authorities as being behind a series of denial-of-service attacks on several municipalities and organizations linked to a NATO summit in the Netherlands. Europol said that the cybercrime network also was involved in attacks in Sweden, Germany and Switzerland. The police agency said the international operation 'led to the disruption of an attack-infrastructure consisting of over one hundred computer systems worldwide, while a major part of the group's central server infrastructure was taken offline.' Law enforcement and judicial authorities from France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Czech Republic, the Netherlands and the United States took simultaneous actions against offenders and infrastructure belonging to the pro-Russian cybercrime network, it said. Judicial authorities in Germany issued six arrest warrants for suspects in Russia, two of them accused of being the main leaders of the group, Europol said. Five of them were identified on Europol's Europe's Most Wanted website. One suspect was placed under preliminary arrest in France and another detained in Spain, Europol said. In the United States, the Federal Bureau of Investigation was involved in the operation. The Paris prosecutor's office said one person is in custody in France and communications equipment has been seized. No charges have yet been filed. The attorney general's office in Switzerland, which is not an EU member country, said in a statement Wednesday that joint investigations between Europol and Swiss federal police helped identify three leading members of the group, which is alleged to have targeted more than 200 Swiss websites. Swiss prosecutors opened a criminal case over the incidents in June 2023, and since then identified several other denial-of-service attacks attributed to the activist group. The attacks included a video address by Ukrainian President Volodymyr Zelenskyy to the Swiss parliament and the popular Eurovision Song Contest, held in in Basel earlier this year. Europol said members of the cybercrime group initially targeted Ukrainian institution, 'but have shifted their focus to attacking countries that support Ukraine in the ongoing defence against the Russian war of aggression, many of which are members of NATO.' Law enforcement authorities in countries involved in the operation contacted hundreds of people believed to support the group to inform them of the crackdown and their alleged liability for its actions. 'Individuals acting for NoName057(16) are mainly Russian-speaking sympathisers who use automated tools to carry out distributed denial-of-service (DDoS) attacks. Operating without formal leadership or sophisticated technical skills, they are motivated by ideology and rewards,' Europol said. It added that people recruited by the group were paid in cryptocurrency and motivated using online-gaming dynamics like leader boards and badges. 'This gamified manipulation, often targeted at younger offenders, was emotionally reinforced by a narrative of defending Russia or avenging political events,' Europol said. Corder writes for the Associated Press. AP writers Jamey Keaten in Geneva, Geir Moulson in Berlin and Angela Charlton in Paris contributed to this report.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store