threatintel
actor tracker
All actors

NoName057(16)

noname05716 · primary source: Other · first observed 2022
RU · RussiaHacktivistLow confidencelast cited Jul 15, 2025 · 10mo ago

Pro-Russia hacktivist collective emerged within weeks of the February 2024 full-scale invasion of Ukraine. Operates 'DDoSia' — a paid crowdsourced DDoS platform where Russian-speaking volunteers run a client that targets a continuously updated list of European, NATO-member, and Ukrainian government and infrastructure sites. Sustained low-impact disruption rather than intrusion: site outages timed to political news cycles (NATO summits, weapons deliveries, election days).

Aliases

NoName057OtherDDoSiaOther

Motivations

disruptioninformation operations

Target sectors

governmentfinancialtransportationmediadefense

Target countries

UAPLDEFRITLTLVEEFICZGB

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • NoName057(16)
  • Russia
  • disruption
  • information operations
Capability
Infrastructure
Victim
  • government
  • financial
  • transportation
  • UA
  • PL
  • +1 more

MITRE ATT&CK techniques

Timeline

4 events
  1. IndictmentHigh2025-07-16·Eurojust

    Eurojust and Europol announce Operation Eastwood takedown of NoName057(16)

    Eurojust and Europol announced the results of Operation Eastwood, a coordinated international action against NoName057(16) carried out between 14 and 17 July 2025. Authorities disrupted more than 100 servers worldwide, executed house searches in Germany, Latvia, Spain, Italy, Czechia, Poland and France, and issued seven international arrest warrants (six from Germany) including for two alleged main instigators based in the Russian Federation. Investigators also notified about 1,100 supporters and 17 administrators of their potential criminal liability. The group recruited roughly 4,000 supporters running DDoSia and had attacked critical infrastructure across the EU.

    ddosiaoperation-eastwoodeuropollaw-enforcement
  2. IndictmentMedium2024-07-20·BleepingComputer

    Spanish Civil Guard arrests three suspected DDoSia participants

    Spain's Civil Guard arrested three individuals in Manacor, Huelva and Seville on suspicion of participating in DDoS attacks targeting public institutions and strategic sectors in Spain and other NATO countries supporting Ukraine. According to Spain's Ministry of the Interior the suspects had used DDoSia, the custom DDoS platform developed and operated by NoName057(16). Computer equipment and documents were seized; the group responded on Telegram by declaring a 'vendetta' against the Spanish authorities and launching follow-on DDoS waves against Spanish targets.

    ddosiaarrestsspainlaw-enforcement
  3. ReportMedium2023-06-29·Sekoia.io

    Sekoia tracks DDoSia targeting across NATO and Western Europe

    Sekoia.io published a detailed analysis of NoName057(16)'s DDoSia project covering May and June 2023, identifying 486 distinct victim websites concentrated in Ukraine and NATO Eastern Flank countries (Lithuania, Poland, Czech Republic, Latvia) with secondary targeting of France, the UK, Italy and Canada. The report documents the project's Telegram-based recruitment (45,000+ subscribers on the main channel by June 2023), cryptocurrency rewards via TON, and rapid retargeting in response to political events such as French air-defence support to Kyiv.

    ddosiaddosnatoreport
  4. ReportMedium2023-01-12·SentinelOne (SentinelLabs)

    SentinelLabs profiles NoName057(16) and the DDoSia toolkit

    SentinelLabs published a profile of NoName057(16), characterising it as a pro-Russian hacktivist collective conducting DDoS campaigns against Ukraine and NATO-aligned entities since March 2022. The analysis dissected two implementations of the group's DDoSia toolkit — an initial Python build and a newer Golang variant internally named 'Go Stresser' — and documented recent targeting of Polish government, Danish financial sector and Czech presidential-candidate websites in December 2022 and January 2023.

    ddosiaddostelegramreport

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). NoName057(16) — actor profile. Retrieved from https://threatintel.local/actors/noname05716

latest cited activity · 2025-07-16