THE HAGUE, July 16, 2025 – In a landmark international effort, Europol, the European Union’s police agency, announced the successful takedown of the pro-Russian cybercrime network NoName057(16) through Operation Eastwood. The operation, conducted between July 14 and 17, 2025, targeted a group responsible for thousands of distributed denial-of-service (DDoS) attacks against Ukraine and its allies, including NATO member states.
The coordinated effort, involving law enforcement from 12 countries, disrupted over 100 computer systems worldwide, took down significant portions of the group’s server infrastructure, and led to arrests in France and Spain. This operation marks a significant step in countering cyber warfare linked to Russia’s ongoing aggression against Ukraine.
Background: The Rise of NoName057(16)
The NoName057(16) group, identified by Dutch authorities in June 2025, emerged as a prolific pro-Russian cybercrime network since its formation in 2022. Initially targeting Ukrainian institutions, the group shifted its focus to countries supporting Ukraine in its defense against Russia’s invasion, particularly NATO members.
The network is notorious for launching DDoS attacks, which overload websites and applications with excessive requests, rendering them inaccessible. These attacks have disrupted critical infrastructure, including electricity suppliers, public transport systems, government websites, and even cultural events like the Eurovision Song Contest in Basel, Switzerland, earlier in 2025.
Europol’s announcement on July 16, 2025, highlighted the group’s attacks on Sweden, Germany, Switzerland, and the Netherlands, notably targeting municipalities and organizations linked to a NATO summit in the Netherlands. The group’s activities are part of a broader wave of Russian-linked cyberattacks aimed at sowing division and undermining support for Ukraine across Europe, as tracked by the Associated Press in a detailed map of such incidents.
Operation Eastwood: A Global Response
Codenamed Eastwood, the operation was a collaborative effort involving law enforcement and judicial authorities from France, Finland, Germany, Italy, Lithuania, Poland, Spain, Sweden, Switzerland, the Czech Republic, the Netherlands, and the United States.
Coordinated by Europol and Eurojust, the operation targeted NoName057(16)’s infrastructure and key operatives, resulting in the disruption of over 100 computer systems worldwide and the takedown of a major part of the group’s central server infrastructure.
Key actions included:
- Arrests and Warrants: German authorities issued six arrest warrants for suspects in Russia, two of whom are believed to be the group’s main leaders. Five of these suspects were listed on Europol’s Europe’s Most Wanted website. One suspect was detained in Spain, and another was placed under preliminary arrest in France, with communications equipment seized, as reported by the Paris prosecutor’s office. No charges have been filed yet, indicating ongoing investigations.
- Server Disruptions: The operation shut down several hundred servers, crippling the group’s ability to launch further attacks. This included taking offline a significant portion of NoName057(16)’s central server infrastructure, a critical blow to its operations.
- Outreach to Supporters: Authorities contacted hundreds of individuals believed to support the group, informing them of the crackdown and their potential liability. This outreach aimed to deter further participation in the group’s activities.
The United States played a significant role, with the Federal Bureau of Investigation (FBI) contributing to the operation. Switzerland, though not an EU member, collaborated closely with Europol, identifying three leading members of the group responsible for targeting over 200 Swiss websites, including a video address by Ukrainian President Volodymyr Zelenskyy to the Swiss parliament.
The Nature of NoName057(16)
NoName057(16) operates as a decentralized network of Russian-speaking sympathizers, primarily motivated by ideology and financial rewards. Unlike traditional cybercrime groups with formal leadership, NoName057(16) relies on automated tools to execute DDoS attacks, requiring minimal technical expertise.
Europol noted that the group’s members are often younger individuals, incentivized through gamified manipulation, such as leaderboards and badges, and paid in cryptocurrency. This approach, described as emotionally reinforcing a narrative of “defending Russia” or “avenging political events,” has been particularly effective in recruiting and mobilizing supporters.
The group’s targets have evolved since 2022. Initially focused on Ukrainian institutions, NoName057(16) expanded its attacks to NATO countries and other supporters of Ukraine, including Sweden, Germany, and Switzerland. Notable incidents include disruptions during the NATO summit in the Netherlands and attacks on Swiss infrastructure, such as the Eurovision Song Contest, which highlighted the group’s intent to destabilize Western institutions and events.
Broader Context: Russia’s Cyber Warfare
The takedown of NoName057(16) is part of a larger effort to counter Russian-linked cyberattacks that have intensified since the invasion of Ukraine in 2022. Western officials have accused Russia and its proxies of orchestrating dozens of attacks, including sabotage attempts and cyberattacks, to undermine support for Ukraine. The Associated Press has documented these efforts, noting their impact on European societies and critical infrastructure.
Operation Eastwood follows other successful international operations, such as the 2024 Operation Endgame, which targeted Russian-led malware groups like Qakbot and Conti. These efforts highlight the growing collaboration between European and North American authorities to combat cybercrime, particularly in the context of geopolitical tensions. The involvement of 12 countries in Operation Eastwood underscores the global nature of the threat and the need for coordinated responses.
Implications for Cybersecurity
The disruption of NoName057(16)’s infrastructure is a significant victory for global cybersecurity, but experts warn that the threat of pro-Russian cyberattacks remains. The group’s decentralized structure and reliance on automated tools make it challenging to fully eradicate, as new sympathizers can be recruited through online platforms. The use of cryptocurrency for payments further complicates efforts to trace and disrupt financial incentives.
The operation also highlights the importance of international cooperation in addressing cybercrime. Europol’s coordination with Eurojust and agencies like the FBI and Swiss federal police demonstrates the effectiveness of cross-border partnerships. However, the issuance of arrest warrants for suspects in Russia, where extradition is unlikely, underscores the challenges of holding cybercriminals accountable in non-cooperative jurisdictions.
Cybersecurity experts emphasize the need for proactive measures to protect critical infrastructure. DDoS attacks, while less sophisticated than ransomware or malware, can cause significant disruptions, particularly to public services and cultural events. The targeting of high-profile events like Eurovision and Zelenskyy’s parliamentary address suggests a strategic intent to maximize visibility and impact, raising concerns about future attacks on similar targets.
Industry and Public Reactions
The announcement of Operation Eastwood has been widely praised by cybersecurity professionals and policymakers. Posts on X, including one from @Europol, celebrated the operation’s success in shutting down over 100 criminal servers, while @InsiderGeo described it as a “major blow” to pro-Russian cybercrime. However, some experts caution that the takedown may lead to retaliatory attacks from other pro-Russian groups, as seen in previous crackdowns.
Public sentiment, as reflected on X, highlights growing concern about cyber warfare’s role in geopolitical conflicts. Users like @fs0c131y noted the operation’s impact on NoName057(16)’s infrastructure, emphasizing the need for continued vigilance. The involvement of younger offenders, manipulated through gamified incentives, has also sparked discussions about the ethical implications of such recruitment tactics and the need for education to counter radicalization in online spaces.
Challenges and Controversies
While Operation Eastwood is a significant achievement, it faces several challenges:
- Jurisdictional Limitations: The issuance of arrest warrants for suspects in Russia is largely symbolic, as extradition is unlikely. This highlights the difficulty of prosecuting cybercriminals operating in non-cooperative countries.
- Decentralized Networks: NoName057(16)’s lack of formal leadership makes it resilient to traditional law enforcement tactics. New members can join through online platforms, potentially reconstituting the group under a different name.
- Potential Retaliation: Past operations against Russian cybercrime groups have led to retaliatory attacks, raising concerns about escalation in the cyber domain.
- Public Awareness: Contacting hundreds of supporters to warn them of liability is a novel approach, but its effectiveness in deterring participation remains uncertain.
Some critics argue that the focus on DDoS attacks, while disruptive, diverts resources from more severe threats like ransomware, which have caused significant financial and societal harm. For example, the Conti group, targeted in Operation Endgame, was notorious for attacking US hospitals during the COVID-19 pandemic, highlighting the need for a balanced approach to cybercrime.
Future Outlook
Operation Eastwood sets a precedent for future international efforts to combat cybercrime, particularly in the context of geopolitical conflicts. Europol’s collaboration with 12 countries demonstrates the power of unified action, but sustained efforts are needed to address the evolving nature of cyber threats. Strengthening cybersecurity for critical infrastructure, enhancing public-private partnerships, and developing international legal frameworks for cybercrime prosecution are critical next steps.
The operation also underscores the need for broader strategies to counter online radicalization and gamified recruitment. By targeting younger individuals with ideological narratives and financial incentives, groups like NoName057(16) exploit vulnerabilities in digital spaces. Educational initiatives and stricter regulations on cryptocurrency transactions could help mitigate these risks.
As the Russia-Ukraine conflict continues, cyberattacks are likely to remain a key tool for pro-Russian groups. The success of Operation Eastwood may deter some actors, but the decentralized and ideological nature of NoName057(16) suggests that similar groups could emerge. Ongoing vigilance, intelligence sharing, and technological advancements will be essential to stay ahead of these threats.
Conclusion
Europol’s Operation Eastwood represents a significant victory in the fight against pro-Russian cybercrime, dismantling the infrastructure of NoName057(16) and disrupting its ability to target Ukraine and its allies. The operation’s success highlights the power of international collaboration, with 12 countries working together to address a shared threat.
However, challenges like jurisdictional limitations, decentralized networks, and potential retaliation underscore the complexity of combating cybercrime in a geopolitically charged environment. As cyberattacks continue to evolve, operations like Eastwood serve as a critical reminder of the need for robust cybersecurity, global cooperation, and proactive measures to protect digital infrastructure and democratic institutions.






