NoName057(16)
Pro-Russia hacktivist collective emerged within weeks of the February 2024 full-scale invasion of Ukraine. Operates 'DDoSia' — a paid crowdsourced DDoS platform where Russian-speaking volunteers run a client that targets a continuously updated list of European, NATO-member, and Ukrainian government and infrastructure sites. Sustained low-impact disruption rather than intrusion: site outages timed to political news cycles (NATO summits, weapons deliveries, election days).
Aliases
Motivations
Target sectors
Target countries
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
4 events- IndictmentHigh2025-07-16·Eurojust
Eurojust and Europol announce Operation Eastwood takedown of NoName057(16)
Eurojust and Europol announced the results of Operation Eastwood, a coordinated international action against NoName057(16) carried out between 14 and 17 July 2025. Authorities disrupted more than 100 servers worldwide, executed house searches in Germany, Latvia, Spain, Italy, Czechia, Poland and France, and issued seven international arrest warrants (six from Germany) including for two alleged main instigators based in the Russian Federation. Investigators also notified about 1,100 supporters and 17 administrators of their potential criminal liability. The group recruited roughly 4,000 supporters running DDoSia and had attacked critical infrastructure across the EU.
ddosiaoperation-eastwoodeuropollaw-enforcement - IndictmentMedium2024-07-20·BleepingComputer
Spanish Civil Guard arrests three suspected DDoSia participants
Spain's Civil Guard arrested three individuals in Manacor, Huelva and Seville on suspicion of participating in DDoS attacks targeting public institutions and strategic sectors in Spain and other NATO countries supporting Ukraine. According to Spain's Ministry of the Interior the suspects had used DDoSia, the custom DDoS platform developed and operated by NoName057(16). Computer equipment and documents were seized; the group responded on Telegram by declaring a 'vendetta' against the Spanish authorities and launching follow-on DDoS waves against Spanish targets.
ddosiaarrestsspainlaw-enforcement - ReportMedium2023-06-29·Sekoia.io
Sekoia tracks DDoSia targeting across NATO and Western Europe
Sekoia.io published a detailed analysis of NoName057(16)'s DDoSia project covering May and June 2023, identifying 486 distinct victim websites concentrated in Ukraine and NATO Eastern Flank countries (Lithuania, Poland, Czech Republic, Latvia) with secondary targeting of France, the UK, Italy and Canada. The report documents the project's Telegram-based recruitment (45,000+ subscribers on the main channel by June 2023), cryptocurrency rewards via TON, and rapid retargeting in response to political events such as French air-defence support to Kyiv.
ddosiaddosnatoreport - ReportMedium2023-01-12·SentinelOne (SentinelLabs)
SentinelLabs profiles NoName057(16) and the DDoSia toolkit
SentinelLabs published a profile of NoName057(16), characterising it as a pro-Russian hacktivist collective conducting DDoS campaigns against Ukraine and NATO-aligned entities since March 2022. The analysis dissected two implementations of the group's DDoSia toolkit — an initial Python build and a newer Golang variant internally named 'Go Stresser' — and documented recent targeting of Polish government, Danish financial sector and Czech presidential-candidate websites in December 2022 and January 2023.
ddosiaddostelegramreport
Indicators of compromise
0 indicatorsRelated actors
shared ATT&CK techniques- ?? · UnknownAnonymous Sudan2 shared techniques
- UA · UkraineIT Army of Ukraine2 shared techniques
- RU · RussiaKillNet2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). NoName057(16) — actor profile. Retrieved from https://threatintel.local/actors/noname05716