logo
Europol-led global operation takes down pro-Russian cybercrime network

Europol-led global operation takes down pro-Russian cybercrime network

Independent16-07-2025
A coordinated international operation has hit the infrastructure of a pro-Russian cybercrime network linked to a string of denial of service attacks targeting Ukraine and its allies, the European Union 's police agency Europol announced Wednesday.
Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified last month by Dutch authorities as being behind a series of denial-of-service attacks on several municipalities and organizations linked to a NATO summit in the Netherlands.
Europol said that the cybercrime network also was involved in attacks in Sweden, Germany and Switzerland.
The police agency said the international operation 'led to the disruption of an attack-infrastructure consisting of over one hundred computer systems worldwide, while a major part of the group's central server infrastructure was taken offline.'
Judicial authorities in Germany issued six arrest warrants for suspects in Russia, two of them accused of being the main leaders of the group, Europol said. Five of them were identified on Europol's Europe's Most Wanted website.
One suspect was placed under preliminary arrest in France and another detained in Spain, Europol said. In the United States, the Federal Bureau of Investigation was involved in the operation.
Europol said members of the cybercrime group initially targeted Ukrainian institution, 'but have shifted their focus to attacking countries that support Ukraine in the ongoing defence against the Russian war of aggression, many of which are members of NATO.'
Law enforcement authorities in countries involved in the operation contacted hundreds of people believed to support the group to inform them of the crackdown and their alleged liability for its actions.
'Individuals acting for NoName057(16) are mainly Russian-speaking sympathisers who use automated tools to carry out distributed denial-of-service (DDoS) attacks. Operating without formal leadership or sophisticated technical skills, they are motivated by ideology and rewards,' Europol said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Ukrainian drone attack sparks fire at railway station in Volgograd region, Russia says
Ukrainian drone attack sparks fire at railway station in Volgograd region, Russia says

Reuters

time2 hours ago

  • Reuters

Ukrainian drone attack sparks fire at railway station in Volgograd region, Russia says

Aug 4 (Reuters) - A Ukrainian drone attack damaged a power line and sparked a fire at a railway station building in Russia's southern region of Volgograd overnight, the regional administration said on Monday. An unexploded drone fell on railway tracks near the Archeda train station, the administration of the region said on the Telegram messaging app, citing Volgograd region's governor, Andrei Bocharov as saying. "No damage to the tracks has been reported," the administration said. Russian state news agency TASS reported several regional trains were delayed in the area. Flights at the regional airport in the city of Volgograd, which is the administrative centre of the broader Volgograd region, were halted for several hours before resuming at around 0300 GMT, Russia's civil aviation authority Rosaviatsia said on Telegram. The full scale of the attack was not immediately clear, but the region's administration cited Bocharov as saying the attack was "massive" and targeted energy and transport infrastructure. Reuters could not independently verify the reports. There was no immediate comment from Ukraine, which has staged frequent attacks on infrastructure inside Russia that Kyiv deems key to Moscow's war efforts - including on the Volgograd region which lies not far from the border with Ukraine.

Ukraine hacks Russian submarine key to Moscow's Arctic expansion
Ukraine hacks Russian submarine key to Moscow's Arctic expansion

Times

time7 hours ago

  • Times

Ukraine hacks Russian submarine key to Moscow's Arctic expansion

Ukraine claims to have pulled off a major hacking operation, obtaining classified data on a new Russian nuclear submarine and revealing potential vulnerabilities as Moscow intensifies its military presence in the Arctic. Beginning service in late July, the Knyaz Pozharsky is a state-of-the-art nuclear submarine — a key element of Moscow's nuclear triad. It is permanently based in Gadzhiyevo, Murmansk Oblast, and part of Russia's Northern Fleet. The hack potentially exposes the limitations of not only this submarine but the entire Borei class fleet, which underpins Russia's strategic position in the Arctic. The Defence Intelligence of Ukraine agency said the stolen files include detailed crew rosters, combat instructions, technical diagrams of combat systems and survivability measures, operational schedules and engineering reports. The schedule log is a comprehensive document showing the vessel's daily combat and routine operations, it said. • Why did Trump move his best nuclear deterrent? Not for strategic gain 'The information obtained by the intelligence officers allows us to identify the features and technical limitations of not only the Knyaz Pozharsky but also other submarines of the 955A project, which are critical to maintaining the imperial myth of the aggressor state of Russia,' the DIU added. Ukraine's reported Knyaz Pozharsky hack is the latest in a series of intelligence operations targeting Russia and its nuclear triad. In early June, Ukraine's GUR launched 'Spider's Web,' an unprecedented drone attack on Russian military airfields, which destroyed several strategic aviation aircraft, also part of Russia's nuclear triad. 'Nuclear weapons are the main symbol of Russia's global greatness,' Maxim Starchak, an expert in Russia's nuclear policy, wrote for Carnegie at the time. 'Operation Spider's Web was undoubtedly a blow to the Kremlin's pride.' The undermining of Moscow's nuclear prowess on Sunday came as the Russian and Chinese navies carried out anti-submarine drills in the Sea of Japan as part of a scheduled joint exercise. They are taking place just days after President Trump ordered two US nuclear submarines to be positioned in 'the appropriate regions' in response to remarks made by the former Russian president Dmitry Medvedev. No independent cybersecurity firm or Western agency has confirmed Sunday's claim, and Russia has issued no official statement acknowledging a breach. • How Dmitry Medvedev went from friend of the West to Trump baiter The Knyaz Pozharsky is a Project 955A Borei‑A class submarine, one of the most advanced elements of the Kremlin's nuclear triad, with high stealth capability, manoeuvrability and offensive power. Each sub carries 16 launch silos for R-30 Bulava intercontinental ballistic missiles, with each missile capable of delivering up to ten nuclear warheads. The nuclear triad consists of land-based intercontinental ballistic missiles, strategic bombers and submarine-launched ballistic missiles that are the core of Russia's nuclear deterrent strategy. Russia has repeatedly escalated nuclear rhetoric throughout the Ukraine conflict, with senior officials threatening potential use of tactical nuclear weapons, though no nuclear arms have been deployed on Ukrainian soil. Last month, President Putin underlined the need to adapt to global military trends and strengthen Russia's nuclear and conventional forces, describing the triad as 'a guarantee of Russia's sovereignty'. During the commissioning event for the Knyaz Pozharsky, Putin announced plans to deploy six more nuclear submarines by 2030 that are to be equipped with Poseidon, an unmanned nuclear-powered underwater vehicle. In the Arctic, Russia has continued to step up its military and economic activities over the past decade. The region is strategically significant due to its vast untapped natural resources and emerging shipping routes. As ice in the region begins melting at increasingly earlier points in the year, shorter shipping routes have opened up throughout the Arctic for longer periods of time, allowing Russia to circumvent foreign powers. It is seeing growing competition, however, from its close ally China, which announced plans for an 'Arctic Silk Road' in 2018, also viewing climate change as an opportunity to access more favourable shipping routes. Russia's nuclear submarine fleet regularly conducts under-ice patrols and exercises in the region as part of Russia's effort to maintain a credible nuclear deterrent and assert military dominance. Alongside its military push, Russia is exploiting the added opportunity melting ice has opened up around the Arctic's energy reserves, focusing on oil, gas and minerals. The Northern Fleet, which operates the Borei-class submarines, regularly conducts exercises in Arctic conditions, including under-ice patrols.

How Ukraine's air defence warriors take aim at Putin's drone swarms
How Ukraine's air defence warriors take aim at Putin's drone swarms

Times

time8 hours ago

  • Times

How Ukraine's air defence warriors take aim at Putin's drone swarms

Russian jets were flying fast towards the Ukrainian anti-aircraft battery. Lightning flashed and thunder roared in the night sky above, sending rain lashing against the branches concealing its position. 'They might launch KABs [glide bombs],' said 'Kingston', 30, as he watched a pair of red markers move across his radar screen in the battery control cabin. Eleven screens fed information from the skies and the battlefield to six soldiers hunched over them. 'That's a Su-34 with a Su-35 behind covering it. If anyone launches at the Su-34, the Su-35 will engage the battery that fired at his wingman.' The command vehicle is a tangle of wires fusing Soviet engineering to cutting-edge technology that the crew of Squadron Interception Unit, Third Army Corps, are testing on the battlefield for a US arms enterprise, looking to undermine President Putin's new weapon of choice. The jets closed to 110 kilometres, only 40 kilometres shy of bombing range. A third Sukhoi jet appeared. 'They're too far out for us to go to the bomb shelter — and if they launch anti-radar missiles, we won't have time anyway,' Kingston said with a wry grin. 'Don't rush, our radar is off,' said a voice over the radio. Kingston's display shows the scanner from another, more powerful radar, further from the front. The jets cannot hunt Kingston and his comrades with their battery's radar down. Instead, they veer south, releasing their bombs at a less fortunate group of Ukrainians. Nor was the Ukrainian battery hunting the Russian jets. They were focused on another prey. 'No Shaheds yet,' the voice on the radio signed off. Putin is gambling that the long-range Shahed suicide drone could prove to be the decisive weapon of this war. Russian troops are launching hundreds of them a night, terrorising cities in an effort to finally break the will of the Ukrainian people after more than three years of fighting. • Why Ukraine's newest weapons offer a glimpse of the future of war Moscow believes the Iranian design, complemented by cheap Chinese components, can force Kyiv's capitulation. Last month the Kremlin showcased its enormous Shahed production facility at Alabuga on state TV. Production is being ramped up of the weapons, which can now travel up to 1,600 miles with an explosive payload of up to 90kg. Other variants can travel further still. On Thursday the UN said Russia had launched ten times more missile and loitering munition attacks in June this year than the same month last year, killing 232 civilians and injuring 1,343. That was the highest monthly toll in three years, according to the UN. In the latest massive combined missile and drone attack on Kyiv on Wednesday 31 people were killed, including a two-year-old and four other children, and another 159 wounded, according to the Ukrainian authorities. Enormous waves of Shaheds are saturating Ukraine's air defences, forcing them to expend expensive missiles made in far smaller numbers on western production lines. 'By winter we'll be seeing thousands of Shaheds per day, and our government is only now starting to look for solutions,' said Odesit, the battery commander. 'Those solutions were needed yesterday.' The Third Army Corps, under the command of Colonel Andriy Biletsky, has decided not to wait for the slow wheels of Ukraine's government procurement to turn. Instead, it has thrown open its sector of the front to western arms companies for testing, research and development. The interception unit is pioneering the use of technology from an American start-up in the hope it can be scaled up to save Ukraine's cities. Outside the control cabin, stacks of small, fast interceptors wait to be launched, shielded from the rain under sheets of tarpaulin. Sleek and grey like missiles but with wings and miniature propellers, these semi-autonomous drones fly much faster than the Shaheds, homing in on their thermal signatures in order to strike them and explode. 'In a month and half, we downed 60 to 70 Shaheds,' said Odesit. 'We were already trying to hit them even when we just had first-person-view drones. But when we finally got a system that could technically do it, it was euphoria.' The Russians soon realised they had a problem in the battery's area of operation. 'A couple of weeks ago they made a major improvement to the Shahed. It senses something is coming for it,' said Odesit. 'They dodge now. Just before impact, they start manoeuvring. We were the first to encounter it because we downed so many. They tested this on us. It's a new problem we are trying to solve.' The interceptor manufacturer had already sent new equipment to counter the manoeuvres, the men of Third Army Corps said. While the battery waited for another wave of Shaheds, the crew played back video of their most recent successful shoot-down. Their equipment's sensors track heat and movement far further than the human eye can see. • Roger Boyes: Europe must keep Ukraine armed until 2027 A pilot guides the interceptor towards the Shahed at high speed using a controller taken from a popular games console. He locks on to the target. The thermal imaging camera relays each detail of the Shahed's engine back to the battery as the interceptor closes on its target, then strikes. These interceptors are the most effective his unit has tried, Odesit said, although arms companies are racing to provide the best solution to the Shahed attacks. 'We've identified two more interesting types of fixed-wing drones — and people went to train on them. They'll come back and we'll test them in combat conditions,' he said. 'Everything that's advertised as interceptors is mostly hype. The truly effective ones are very few.' The new technology does not always work smoothly. The soldiers have to contact a remote tech support to overcome error messages flashing on screen among lines of code and English-language prompts. Computers, routers and controls are restarted in sequences. 'It's endless,' said Odesit. 'The more complex the technology, the more problems.' The men have had to become rudimentary electricians, fixing cables and testing connections. Their battlefield tests were designed to eliminate these 'bugs', Odesit stressed, praising the manufacturer for providing 24-hour tech support. The soldiers' frontline feedback is vital to improving the system, which they believe is on track to solving the Shahed problem for the entire country. Meanwhile, the radar screens are alight with activity. A wave of Shaheds is attacking Odesa across the sea from Crimea. A Ukrainian helicopter marked blue is engaging a Shahed marked red with a machine gun over the Donbas. A Ukrainian equivalent to the Shahed, Liutiy long-range kamikaze drones, are descending on Russia's Millerovo air base. Millerovo is the primary launch site for drones crossing the battery's operational area and it was hit hard the night before, the crew said. So they settled in for a quiet night, sipping energy drinks to stay focused until their shift finished. The Times departed shortly beforehand for the nearby town of Izyum only to discover that, after seeing their aircraft shot down en masse at night, the Russian Shahed operators here had changed tactics. It was already broad daylight on a weekday morning when the distinctive whine of a Shahed engine finally appeared above the town, growing ever louder as it flew closer. Humming harder as it descended, it skimmed ten metres above the building accommodating The Times, before crashing into a warehouse some 500 metres away. A second followed, sending a grey smoke plume into the air. It is not only the technology that can change and surprise, the Russians have proven. 'The enemy quickly finds countermeasures,' said Odesit. 'Then we find counter-countermeasures. It's constant competition. Whoever's a step ahead gets results.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store