Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Operation Eastwood Hits Pro-Russian Hackers

July 17, 2025
Reading Time: 3 mins read
in News
Operation Eastwood Hits Pro-Russian Hackers

International Law Enforcement Delivers Major Blow to Pro-Russian Hacker Group NoName057(16)

Operation Eastwood, a significant international law enforcement initiative coordinated by Europol and Eurojust, has successfully disrupted the pro-Russian hacktivist group NoName057(16). This joint effort, carried out between July 14 and 17, saw simultaneous actions by law enforcement and judicial authorities from over a dozen countries, including Czechia, France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Netherlands, and the United States. The operation also received support from ENISA, Belgium, Canada, Estonia, Denmark, Latvia, Romania, Ukraine, and private cybersecurity firms ShadowServer and abuse.ch, highlighting the broad collaboration necessary to combat such cyber threats.

The impact of Operation Eastwood on NoName057(16) was substantial, leading to the disruption of their extensive infrastructure.

Over 100 computer systems and key central servers used by the group were taken offline, severely crippling their operational capabilities. Authorities issued a total of seven arrest warrants, with six targeting Russian nationals, two of whom are identified as the primary instigators of the group’s activities. These suspects are now internationally wanted, with five prominently featured on the EU Most Wanted website. Beyond arrests and infrastructure takedowns, the operation also included a significant outreach effort: hundreds of the group’s supporters were directly warned via messaging applications about their potential legal liabilities for participating in or aiding the group’s Distributed Denial of Service (DDoS) attacks.

Operation Eastwood’s operational phase resulted in tangible actions against the group’s members and enablers. Two arrests were made, one in France and another in Spain. Furthermore, law enforcement conducted 24 house searches across multiple countries, including Czechia, France, Germany, Italy, Spain, and Poland, gathering crucial evidence. Thirteen individuals were questioned as part of the ongoing investigation. In a broader move to deter future involvement, over 1,000 supporters, including 15 identified as administrators, received direct notifications about their legal responsibilities, underscoring the severity with which international authorities view participation in such cyber activities.

NoName057(16) has been a persistent threat, known for escalating DDoS attacks against nations that support Ukraine, many of which are NATO members.

Since 2023, the group has targeted a wide array of entities, including Swedish government and banking sites, over 250 German entities across 14 attack waves, and disruptions during high-profile events in Switzerland, such as the Ukraine Peace Summit. The group was also linked by Dutch authorities to an attack during a recent NATO summit. While these attacks aimed to cause significant disruption, the proactive measures by cybersecurity defenses and rapid response by targeted organizations have largely mitigated the impact, preventing major service interruptions.

The group’s operational model relies heavily on a large base of over 4,000 supporters and a self-built botnet comprising hundreds of servers. NoName057(16) actively spreads its propaganda and recruits new members through various online channels, including social media, forums, and niche chat applications. They leverage tools like “DDoSia” to lower the technical barrier for participation, making it easier for individuals to contribute to their attacks. A key element of their recruitment strategy involves gamification, where participants are paid in cryptocurrency and incentivized through game-like dynamics such as leaderboards, shout-outs, and badges, fostering a sense of status and involvement. This manipulative approach, often targeting younger individuals, is reinforced by a narrative that frames their actions as defending Russia or avenging political events.

Reference:

  • Operation Eastwood Disrupts Activities of Pro-Russian Hacker Group NoName057(16)
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

SAP S4hana Exploited Vulnerability

US Allies Push For Sboms In Security

September 5, 2025
SAP S4hana Exploited Vulnerability

Reward For Russian FSB Hackers

September 5, 2025
SAP S4hana Exploited Vulnerability

US Sues Robot Toy Maker Over Data

September 5, 2025
Google Fined For Cookie Violations

Google Fined For Cookie Violations

September 4, 2025
Google Fined For Cookie Violations

Youtube Cracks Down On Password Sharing

September 4, 2025
Google Fined For Cookie Violations

Moscow Hires Hackers Behind School Breach

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial