Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Operation Eastwood Hits Pro-Russian Hackers

July 17, 2025
Reading Time: 3 mins read
in News
Operation Eastwood Hits Pro-Russian Hackers

International Law Enforcement Delivers Major Blow to Pro-Russian Hacker Group NoName057(16)

Operation Eastwood, a significant international law enforcement initiative coordinated by Europol and Eurojust, has successfully disrupted the pro-Russian hacktivist group NoName057(16). This joint effort, carried out between July 14 and 17, saw simultaneous actions by law enforcement and judicial authorities from over a dozen countries, including Czechia, France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Netherlands, and the United States. The operation also received support from ENISA, Belgium, Canada, Estonia, Denmark, Latvia, Romania, Ukraine, and private cybersecurity firms ShadowServer and abuse.ch, highlighting the broad collaboration necessary to combat such cyber threats.

The impact of Operation Eastwood on NoName057(16) was substantial, leading to the disruption of their extensive infrastructure.

Over 100 computer systems and key central servers used by the group were taken offline, severely crippling their operational capabilities. Authorities issued a total of seven arrest warrants, with six targeting Russian nationals, two of whom are identified as the primary instigators of the group’s activities. These suspects are now internationally wanted, with five prominently featured on the EU Most Wanted website. Beyond arrests and infrastructure takedowns, the operation also included a significant outreach effort: hundreds of the group’s supporters were directly warned via messaging applications about their potential legal liabilities for participating in or aiding the group’s Distributed Denial of Service (DDoS) attacks.

Operation Eastwood’s operational phase resulted in tangible actions against the group’s members and enablers. Two arrests were made, one in France and another in Spain. Furthermore, law enforcement conducted 24 house searches across multiple countries, including Czechia, France, Germany, Italy, Spain, and Poland, gathering crucial evidence. Thirteen individuals were questioned as part of the ongoing investigation. In a broader move to deter future involvement, over 1,000 supporters, including 15 identified as administrators, received direct notifications about their legal responsibilities, underscoring the severity with which international authorities view participation in such cyber activities.

NoName057(16) has been a persistent threat, known for escalating DDoS attacks against nations that support Ukraine, many of which are NATO members.

Since 2023, the group has targeted a wide array of entities, including Swedish government and banking sites, over 250 German entities across 14 attack waves, and disruptions during high-profile events in Switzerland, such as the Ukraine Peace Summit. The group was also linked by Dutch authorities to an attack during a recent NATO summit. While these attacks aimed to cause significant disruption, the proactive measures by cybersecurity defenses and rapid response by targeted organizations have largely mitigated the impact, preventing major service interruptions.

The group’s operational model relies heavily on a large base of over 4,000 supporters and a self-built botnet comprising hundreds of servers. NoName057(16) actively spreads its propaganda and recruits new members through various online channels, including social media, forums, and niche chat applications. They leverage tools like “DDoSia” to lower the technical barrier for participation, making it easier for individuals to contribute to their attacks. A key element of their recruitment strategy involves gamification, where participants are paid in cryptocurrency and incentivized through game-like dynamics such as leaderboards, shout-outs, and badges, fostering a sense of status and involvement. This manipulative approach, often targeting younger individuals, is reinforced by a narrative that frames their actions as defending Russia or avenging political events.

Reference:

  • Operation Eastwood Disrupts Activities of Pro-Russian Hacker Group NoName057(16)
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Police Dismantle Crypto Fraud Ring

Police Dismantle Crypto Fraud Ring

September 30, 2025
Police Dismantle Crypto Fraud Ring

UK Arrests Suspect In RTX Ransomware

September 30, 2025
Police Dismantle Crypto Fraud Ring

Police Seize 439 Million In Cybercrime

September 30, 2025
UK Police Seize 5.5 Billion In Bitcoin

UK Police Seize 5.5 Billion In Bitcoin

September 30, 2025
UK Police Seize 5.5 Billion In Bitcoin

Interpol Cracks Down On African Scams

September 30, 2025
UK Police Seize 5.5 Billion In Bitcoin

National Cyber Authorities Release OT Guide

September 30, 2025

Latest Alerts

Hackers Target Libraesva Email Flaw

ShadowV2 Botnet Targets Misconfigured AWS

Cisco Warns Of IOS Zero Day Bug

CISA Warns Of Critical Sudo Flaw

Cybercriminals Use Facebook Google Ads

Fake Microsoft Teams Installers Spread

Subscribe to our newsletter

    Latest Incidents

    Ukrainian Hackers Breach Crimean Servers

    Ransomware Gang Claims Maryland Breach

    Arizona School District Data Breach

    Attackers Take Down Asahi Brewer

    Harrods Alerts Customers To Breach

    Hackers Steal Photos From Kido Nursery

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial