Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Kong AI Gateway 3.11 introduces new method for reducing token costs

      July 16, 2025

      Got ChatGPT Plus? You can record and summarize meetings on a Mac now – here’s how

      July 17, 2025

      I put this buzzworthy 2-in-1 robot vacuum to work in my house – here’s how it fared

      July 17, 2025

      AI agents will change work and society in internet-sized ways, says AWS VP

      July 17, 2025

      This slick gadget is like a Swiss Army Knife for my keys (and fully trackable)

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Notes Android App Using SQLite

      July 17, 2025

      How to Get Security Patches for Legacy Unsupported Node.js Versions

      July 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft says it won’t change Windows 11’s system tray design after users feedback

      July 17, 2025
      Recent

      Microsoft says it won’t change Windows 11’s system tray design after users feedback

      July 17, 2025

      How Rust’s Debut in the Linux Kernel is Shoring Up System Stability

      July 17, 2025

      Microsoft is on track to become the second $4 trillion company by market cap, following NVIDIA — and mass layoffs

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Authorities Seize Over 100 Servers of the Pro‑Russian NoName057(16) Hacktivist Network

    Authorities Seize Over 100 Servers of the Pro‑Russian NoName057(16) Hacktivist Network

    July 16, 2025

    NoName057(16), Operation Eastwood, Hacktivist, Hacktivist Group, Pro-Russian Hacktivists

    Europe’s cyberlaw enforcers just dealt a blow to the pro‑Russian hacktivist group NoName057(16), notorious for orchestrating DDoS attacks on NATO-aligned nations. A coordinated international operation led by Europol targeted the group’s infrastructure including more than 100 servers worldwide, and affiliates in a strike timed to disrupt its ability to launch cyberattacks from the source.

    Tactical Takedown

    The takedown, executed earlier this month under the banner name “Operation Eastwood“, was the result of a multi-country law enforcement operation targeting the group’s infrastructure, financial channels, and administrative operators.

    The group gained notoriety for its highly coordinated digital assaults on critical infrastructure in Ukraine-supporting countries, including Poland, Lithuania, Norway, and the United States. Its weapon of choice was distributed denial-of-service (DDoS) attacks that crippled government portals, financial services, and public transport websites—often with overt political messaging and nationalistic undertones.

    About NoName057(16)

    Operating primarily through encrypted Telegram channels and GitHub repositories, NoName057(16) has been active since early 2022, launching aggressive DDoS attacks under the guise of patriotic retaliation for Western support to Ukraine.

    Their infrastructure was supported by a publicly distributed DDoS toolkit called “DDOSIA,” which enabled followers and freelance hacktivists to launch packet floods against chosen targets using a plug-and-play interface. The campaign’s distributed model—paired with constant propaganda drops on Telegram—allowed the group to crowdsource digital disruption at scale.

    NoName057(16), Operation Eastwood, Hacktivist, Hacktivist Group, Pro-Russian Hacktivists
    Source: Europol

    According to Europol, the network relied on both centrally coordinated command-and-control servers and loosely affiliated contributors executing instructions provided in public forums.

    Their tactics, while not the most sophisticated in the cyber arsenal, were effective precisely because of their relentless nature and ideological fervor. They primarily focused on:

    • DDoS Attacks: Flooding websites and online services, making them inaccessible to legitimate users.
    • Targeting Critical Sectors: Railways, transportation, media, healthcare, and government portals across Europe and North America have all felt their wrath.
    • Propaganda and Intimidation: Beyond the technical disruption, their attacks served a psychological purpose, aiming to sow chaos and demonstrate Russia’s digital reach.

    They weren’t just hackers; they were digital saboteurs, aligned with a broader geopolitical agenda, operating in a gray zone where patriotism and cybercrime seamlessly intertwined.

    Also read: Undercover Researchers Decode Hidden Operations of NoName057(16)

    Impact of ‘Operation Eastwood’

    The law enforcement offensive was coordinated by Europol’s European Cybercrime Centre (EC3) and involved authorities from the Czech Republic, France, Germany, Hungary, Italy, Slovakia, the Netherlands, and the United States.

    Key outcomes from the operation include:

    • Two suspects arrested and multiple others identified across jurisdictions.

    • Dozens of digital assets seized, including over 100 servers worldwide, Telegram admin credentials, GitHub-hosted malware tools, and likely cryptocurrency wallets tied to NoName057(16)’s crowdfunding campaigns.

    • The group’s Telegram bot, used to assign attack targets and display real-time “victory” messages, was taken offline.

    • While not explicitly stated in every detail, disrupting the financial channels that sustain such groups is always a critical component of these operations.

    Last year, the Spanish authorities arrested three individuals linked to the hacktivist group from Mallorca, Huelva, and Seville. Information recovered from the seized devices and infrastructure during these arrests could possibly have been the starting point of Operation Eastwood.

    Also read: Spanish Police Arrests Three Suspects Linked to NoName057(16) Attacks

    The Victims

    Since its inception, NoName057(16) has zeroed in on NATO-aligned countries. The group’s targets have included:

    • Ministries and parliaments in the Nordic and Baltic states

    • Energy and transport providers in Eastern Europe

    • News agencies and media outlets in the United States, Germany, and France

    • Banking portals and defense-linked services in Sweden, Poland, Czech Republic, and Italy

    Many of these attacks followed political events such as arms deliveries to Ukraine or high-profile visits from Western leaders. According to Europol, this political opportunism was strategically timed to create digital disruption and social unrest while promoting pro-Kremlin narratives.

    Telegram, GitHub, and the Crowdsourced DDoS Model

    NoName057(16) leveraged GitHub to host its DDoS scripts and Telegram to communicate attack targets. One of their key innovations was the use of the DDOSIA platform, which allowed followers to launch attacks and receive cryptocurrency rewards.

    This gamified hacktivism model blurred the lines between cybercrime, patriotic activism, and low-cost cyberwarfare. By outsourcing infrastructure destruction to willing volunteers, the group created what Europol called a “cybercrime-as-a-crowd” model.

    But that decentralized strength also became a weakness. Law enforcement teams were able to track the Telegram admins and DDoS software updates via GitHub commits and relay servers. This digital breadcrumbs could also possibly have led directly to the infrastructure takedown and identification of suspects.

    Europol says the offensive against NoName057(16) is ongoing. With suspects identified and infrastructure seized, the group’s future campaigns face heightened disruption.

    Still, NoName057(16) thrives on ad hoc organization and loosely affiliated participants. Taking out servers is tactical; shifting ideology, platforms, and anonymity is strategic. Tracking Telegram channels, GitHub repos, and IP watermarking tactics will be vital for continued disruption.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePolice dismantle DiskStation ransomware gang targeting NAS devices, arrest suspected ringleader
    Next Article Anthropic’s Claude Code gets new analytics dashboard to provide insights into how teams are using AI tooling

    Related Posts

    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    July 17, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-32970 – XWiki Open Redirect Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    I tested a 34-inch 240Hz QD-OLED gaming monitor that nails performance and design — with a price that’s lower than you’d guess

    News & Updates

    Development Release: Emmabuntüs DE6 RC1

    News & Updates

    6 first world Windows 11 problems I desperately want Microsoft to fix

    News & Updates

    Highlights

    PumaBot: New Stealthy Linux Botnet Evades Detection, Targets IoT Devices

    June 1, 2025

    PumaBot: New Stealthy Linux Botnet Evades Detection, Targets IoT Devices

    Cybersecurity researchers at Darktrace have exposed a stealthy and persistent Linux-based botnet dubbed PumaBot, which leverages Go binaries, SSH brute-force attacks, and custom backdoors to target In …
    Read more

    Published Date:
    Jun 01, 2025 (5 hours, 47 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2023-48788

    CVE-2025-4691 – “Free Booking Plugin for Hotels, Restaurants and Car Rentals – eaSYNC Booking Direct Object Reference Vulnerability”

    May 31, 2025

    CVE-2025-5861 – Tenda AC7 Buffer Overflow in AdvSetLanip Function

    June 9, 2025

    CVE-2025-1753 – LLama-Index OS Command Injection Vulnerability

    May 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.