Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Confident security, “AI signal” comes out of stealth for $4.2 million

North Korean hackers blamed record-breaking spikes in 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine
Identity

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

userBy userJuly 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The international operations coordinated by Europol disrupt the infrastructure of a Russian hacktivist group known as NonMAME057 (16), which is associated with a series of distributed denial of service (DDOS) attacks against Ukraine and its allies.

This action has dismantled most of the group’s central server infrastructure and over 100 systems around the world. The joint efforts included two arrests in France and Spain, searching two dozen homes in Spain, Italy, Germany, the Czech Republic, France and Poland, and issuing a warrant for arrests for six Russian citizens.

Operation Eastwood took place between July 14th and 17th, with authorities from the Czech Republic, France, France, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Netherlands and the United States. The study was also supported by Belgium, Canada, Estonia, Denmark, Latvia, Romania and Ukraine.

Cybersecurity

NONAME057 (16) has been in operation since March 2022 and serves as a prokremlin group to mobilize ideologically motivated sympathizers with telegrams to launch DDOS attacks using a special program called DDOSIA and maintain efforts to continue to exchange cryptocurrency payments. It occurred shortly after Russia’s invasion of Ukraine.

Five individuals from Russia have been added to the EU’s most wanted list, allegedly supporting nonme57 (16) –

Andrey Muravyov (aka Dazbastadraw) Maxim Nikolaevich Lupine (aka S3Rmax) Olga Evstratova (aka Olechochek, Olenka) Mihail Evgeyevich Burlakov (aka Ddosator3000, Darkklogo) and Rej Stanislavovich Ponnysima

“Burlakov is suspected of being a central member of the group “NonAME057 (16)” and therefore contributed greatly to the DDOS attacks in various institutions in Germany and other countries.”

“In particular, he envisions a leading role within the group under the pseudonym “Darkklogo” and is suspected in this role that included developing and further optimization of software for strategic identification of targets, as well as implementing payments for the development of attack software and lease of illegal servers. ”

Additionally, Evstratova, considered a core member of the group, has been accused of being responsible for optimizing Ddosia attack software. Avrosimow is attributed to 83 cases of computer sabotage.

Europol said the authorities reached out to more than 1,000 individuals believed to be supporters of cybercrime networks and notified them of criminal liability they would bear to use automated tools to coordinate DDOS attacks.

“In addition to the network’s activities estimated to be over 4,000 supporters, the group was also able to build its own botnet consisting of hundreds of servers used to increase the attack load,” Europol said.

“Game-like dynamics, regular screams, leaderboards, or badges mimicked volunteers with a sense of status. This ginged manipulation, often targeting young criminals, was emotionally reinforced by the narrative of defending Russia or revenging political events.”

Cybersecurity

In recent years, threat actors have been observed to stage a series of attacks targeting Swedish authorities and bank websites against 250 German companies and institutions over the course of 14 separate waves since November 2023.

Last July, Spain’s La Guardia Civil arrested three suspected members of the group for participating in a “denial of service cyberattack on public institutions and strategic sectors of Spain and other NATO countries.”

This development is because Russian hackitivist groups like Z-Pentest, Dark Engine and Sector 16 are increasingly training their vision on critical infrastructure, surpassing the weakness of websites related to DDOS attacks and usually ideologically motivated cyberattacks.

“The group coordinates messaging, adjusts timing and shares targeting priorities, suggesting intentional collaboration to support Russia’s strategic cyber goals,” Cyble said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRoblox introduces new safeguards for teens, including age estimation technology
Next Article Lovable will become a unicorn in the $200 million Series A just eight months after its release
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

What security leaders need to know in 2025

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Confident security, “AI signal” comes out of stealth for $4.2 million

North Korean hackers blamed record-breaking spikes in 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.