
Europol-led operation takes down pro-Russian cybercrime network
Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified last month by Dutch authorities as being behind a series of denial-of-service attacks on several municipalities and organisations linked to a NATO summit in the Netherlands.
Europol said that the cybercrime network also was involved in attacks in Sweden, Germany, and Switzerland.
The police agency said the international operation 'led to the disruption of an attack-infrastructure consisting of over one hundred computer systems worldwide, while a major part of the group's central server infrastructure was taken offline'.
Judicial authorities in Germany issued six arrest warrants for suspects in Russia, two of them accused of being the main leaders of the group, Europol said. Five of them were identified on Europol's Europe's Most Wanted website.
One suspect was placed under preliminary arrest in France and another detained in Spain, Europol said. In the United States, the Federal Bureau of Investigation (FBI) was involved in the operation.
Europol said members of the cybercrime group initially targeted Ukrainian institutions, 'but have shifted their focus to attacking countries that support Ukraine in the ongoing defence against the Russian war of aggression, many of which are members of NATO'.
Law enforcement authorities in countries involved in the operation contacted hundreds of people believed to support the group to inform them of the crackdown and their alleged liability for its actions.
'Individuals acting for NoName057(16) are mainly Russian-speaking sympathisers who use automated tools to carry out distributed denial-of-service (DDoS) attacks,' Europol said.
'Operating without formal leadership or sophisticated technical skills, they are motivated by ideology and rewards'.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Euronews
8 hours ago
- Euronews
One person killed as Russia pounds Ukraine with 300 drones
Russia launched more than 300 drones and over 30 missiles towards different cities in Ukraine overnight into Saturday morning, killing at least one person and injuring several others, Ukrainian President Volodymyr Zelenskyy has said. "Rescue operations are underway following the attack: the Donetsk, Kirovohrad, Dnipro, Sumy, Kherson, Volyn, Zaporizhzhia, Mykolaiv, Odesa, and Zhytomyr regions were affected," he wrote on X. The Black Sea port city of Odesa came under fire by 20 drones and a missile, the city's mayor Hennadii Trukhanov, said Saturday on Telegram. The strike sparked a fire in an apartment block. Five people were rescued from their burning apartments, including one woman who died after she was rescued. At least six other people, including a child, were injured. Meanwhile in Sumy, critical infrastructure was damaged and thousands of families were left without electricity, according to Zelenskyy. Russia also launched a barrage of drones at Pavlohrad, damaging critical infrastructure and a residential building. According to the head of the Dnipro regional military administration, it was the largest attack on the city since Russia's full-scale invasion. The Ukrainian president thanked international leaders 'who understand how crucial it is to promptly implement our agreements' aimed at boosting Ukraine's defense capabilities, including joint weapons production, investment in drone manufacturing and the supply of air defence systems. In recent weeks, Russia has been intensifying its long-range attacks on Ukraine, often firing more drones in a single night than it did during some months in 2024. Analysts have warned the attacks are likely to escalate further. On 8 July, Russia fired a record-breaking number of more than 741 drones and missiles. Meanwhile, Russia's Defense Ministry said it shot down 71 Ukrainian drones overnight, of which 13 drones were shot down as they approached Moscow, according to the city's mayor Sergei Sobyanin.

LeMonde
20 hours ago
- LeMonde
Secondhand medals reveal the existence of Russian intelligence cyber units
The insignia features a key, undamaged despite three menacing lightning bolts placed just above. Produced for employees of the "ST department" of the 16 th Center of the Federal Security Service (FSB) of the Russian Federation, this simple piece of metal reveals the existence of a previously unknown unit tasked with protecting communications within Russia's domestic intelligence agency. This is one of several key findings in a report published Thursday, July 18, by Checkfirst, a company that specializes in the fight against disinformation. The organization collected and analyzed several hundred photographs of medals, insignia and decorations, found on manufacturer websites or shared on specialized platforms for collectors. Russian security forces have a strong affinity for commemorative decorations and medals – a tradition inherited from the Soviet Union and one that remained particularly prevalent after the fall of the Berlin Wall. For the equivalent of a few dozen euros, these specialized websites allow former officers and soldiers to sell their insignia, which may commemorate a unit, an anniversary or an event.


Euronews
a day ago
- Euronews
UK sanctions Russian spies over deadly Ukraine theatre strike
The UK sanctioned 18 officers and three units from Russia's military intelligence agency (GRU) on Friday over their role in a 2022 air strike on a theatre in Ukraine that killed hundreds of civilians. The Foreign, Commonwealth and Development Office (FCDO) said the targeted GRU personnel were responsible for preparations leading to the bombing of the Mariupol Drama Theatre, where civilians had taken refuge and painted the word "children" outside in large letters hoping to deter attacks. The strike on 16 March 2022 is believed to have killed around 600 people, including many children, according to an investigation by the Associated Press. Western officials have blamed Russia for over 70 attacks since 2022, aimed at destabilising Europe and weakening support for Ukraine. "GRU spies are running a campaign to destabilise Europe, undermine Ukraine's sovereignty and threaten the safety of British citizens," said Foreign Secretary David Lammy. The UK alleges that GRU Unit 26165 conducted online reconnaissance of civilian bomb shelters in Mariupol and Kharkiv in the days leading up to the attack. In addition to their role in Ukraine, the officers are accused of past operations including targeting the family of former Russian spy Sergei Skripal, who was poisoned alongside his daughter with the nerve agent Novichok in Salisbury in 2018. The same GRU unit is believed to have used malware in 2013 to spy on the email account of Skripal's daughter, Yulia. The FCDO described Unit 26165 as a "highly sophisticated, well-established cyber actor" involved in intelligence gathering and hack and leak operations against Ukraine, NATO and European countries. It also linked the unit to cyberattacks on the US Democratic Party in 2016, French President Emmanuel Macron's 2017 campaign and attempted interference in the 2024 Paris Olympics. Another GRU division, Unit 74455, was said to have launched cyberattacks against the UK Foreign Office and the Defence Science and Technology Laboratory during the Skripal investigation. The UK's National Cyber Security Centre added that Russian hackers had developed malware designed to gain unauthorised access to Microsoft cloud accounts. Friday's sanctions also targeted the African Initiative, an outlet allegedly used by Russian intelligence operatives to conduct disinformation campaigns in Africa, including efforts to weaken public health programmes and destabilise local governments. While the immediate impact of the sanctions — typically asset freezes and travel bans — may be limited, British officials said they aim to raise the cost of involvement in hostile acts and restrict international travel.