Skip to content

Global Law Enforcement Agency Europol Disrupted Infrastructure of Hacking Collective "NoName057(16)", Spanning Over 100 Servers Across the Globe

International cooperation effectively took down the hacking group NoName057(16), known for its pro-Russian activities.

Global Law Enforcement Agency Europol Thwarted "NoName057(16)" Cybercrime Group's Global Network of...
Global Law Enforcement Agency Europol Thwarted "NoName057(16)" Cybercrime Group's Global Network of Over 100 Servers

Global Law Enforcement Agency Europol Disrupted Infrastructure of Hacking Collective "NoName057(16)", Spanning Over 100 Servers Across the Globe

A major international cybercrime crackdown, codenamed Operation Eastwood, has successfully targeted the pro-Russian hacking group NoName057(16). Led by Europol and Eurojust, the operation took place between July 14 and 17, 2025, involving over 20 countries worldwide[1][2][3][4].

The operation's primary objective was to dismantle NoName057(16), a network primarily composed of Russian-speaking sympathizers using automated tools to carry out politically motivated DDoS attacks supporting the pro-Russian cause[4]. The group's infrastructure, including over 100 computer systems and central servers, was taken offline worldwide, significantly impacting their ability to conduct DDoS attacks, particularly against Ukrainian infrastructure and NATO-linked targets[1][2][4][5].

Two preliminary arrests were made—one in France and one in Spain—during the operation, with seven arrest warrants issued, six of which target Russian nationals, including two alleged main instigators residing in Russia[1][2][3][4]. Authorities also conducted 24 house searches across Europe and questioned 13 individuals as part of the investigation[3][4].

Europol established a coordination center at its headquarters to link participating countries through a Virtual Command Post, supported judicial coordination by Eurojust, and received technical assistance from private parties like ShadowServer and abuse.ch, as well as the cyber security agency ENISA[1][4].

NoName057(16) employed gamified manipulation tactics, such as cryptocurrency payments, leaderboards, and badge systems, to incentivize sustained participation in DDoS attacks[2]. The group also constructed a botnet consisting of several hundred servers to amplify their attack capabilities[2].

In addition to targeting the group's personnel and infrastructure, authorities reached out to over 1,000 suspected supporters through messaging applications, informing them of potential criminal liability under national legislation[3].

While Operation Eastwood dealt a significant blow by dismantling much of the group’s operational backbone, some core members remain at large and could attempt to regroup or rebrand[3]. The operation serves as a significant multinational effort to degrade the cyberattack capabilities of NoName057(16) and sends a clear message that such activities will not be tolerated.

Sources: [1] Europol Press Release, (2025), Operation Eastwood: International cybercrime operation targets pro-Russian hacking network NoName057(16). [2] Eurojust Press Release, (2025), Operation Eastwood: European judicial cooperation dismantles pro-Russian hacking network NoName057(16). [3] The Guardian, (2025), International cybercrime operation targets pro-Russian hacking network NoName057(16). [4] BBC News, (2025), Pro-Russian hacking network NoName057(16) dismantled in international cybercrime operation. [5] The Washington Post, (2025), Operation Eastwood: A global cybercrime crackdown on pro-Russian hackers.

A significant multinational effort in the realm of technology, Operation Eastwood, aimed to degrade the cyberattack capabilities of NoName057(16), a pro-Russian hacking group, in the general-news domain. The closure of NoName057(16)'s operations marked a significant milestone in the battle against cybercrime and justice, underscoring the international community's commitment to combating such activities.

Read also:

    Latest