falconfeeds
Features
Solutions
Resources
Plans
Contact US
© 2025 T-Sanct Technologies Pvt Ltd.
falconfeeds
Features
Solutions
Resources
Plans
Contact US
© 2025 T-Sanct Technologies Pvt Ltd.

HOME | BLOGS | CATEGORY | January to July 2024 Cyber Activities

Aug, 4 2024
8 minutes 30 seconds mins read

NoName057(16): January to July 2024 Cyber Activities

January to July 2024 Cyber Activities

Introduction

NoName057(16), a pro-Russian hacktivist group, has been on a relentless campaign of Distributed Denial of Service (DDoS) attacks targeting Western institutions since March 2022. Leveraging the DDosia attack toolkit, the group has effectively recruited volunteers through Telegram, forming alliances with various hacker groups, including pro-Russian and anti-Israel/pro-Palestine factions. This blog delves into NoName057(16)’s activities from January to July 2024, shedding light on their evolution, strategies, and the widespread impact of their operations.

Background and Evolution

Origins and Early Activities

NoName057(16) emerged in early 2022, coinciding with Russia's invasion of Ukraine. The group initially focused on nations opposing Russia's actions, quickly gaining momentum. The launch of the DDosia project on Telegram marked a significant turning point, enabling the group to recruit a volunteer army of pro-Russian hackers incentivized by a performance-based reward system.

Evolution of Tactics

As NoName057(16) continued its operations, the group refined its tactics, demonstrating advanced organizational capabilities. A key milestone was reached on February 7, 2024, when the group introduced a program allowing volunteers to form teams, thereby enhancing coordination and effectiveness. A week later, on February 14, 2024, a referral program was implemented to promote DDosia, further incentivizing recruitment through rewards for successful attacks. These strategic moves highlight the group's methodical approach to expanding its operational capacity.

Analysis of Activities (January - July 2024)

Overall Incident Overview

From January to July 2024, NoName057(16) was responsible for 1,936 incidents, consistently targeting various sectors and countries across North America, Europe, and Asia. The group targeted between 1 to 27 organizations per day, often focusing on repeat attacks. May saw the highest number of incidents, with Moldova as the primary target. The government and public sector were the most frequently attacked during this period.

January to July 2024 Cyber Activities

January to July 2024 Cyber Activities

January and May recorded the highest number of attacks, with over 300 incidents each, followed by July, April, February, and March. The lowest number of incidents was recorded in June.

Geographic Distribution

NoName057(16) has targeted three continents: North America, Europe, and Asia.

January to July 2024 Cyber Activities

January to July 2024 Cyber Activities

Sector Impact

The Government & Public Sector, Transportation & Logistics, and Financials were the most affected sectors, reflecting the group’s strategic targeting of critical infrastructure.

January to July 2024 Cyber Activities

January to July 2024 Cyber Activities

Timeline of Key Activities (January to July 2024)

  • January 22, 2024: Released an updated manifesto inviting alliances with other pro-Russian hacker groups.
  • January 28, 2024: Significant increase in collaboration with allied hacker groups observed.
  • February 7, 2024: Launched a new program within DDosia, enabling volunteers to form teams.
  • February 14, 2024: Introduced a referral program for DDosia, promoted via their Telegram channel.
  • March 6, 2024: Conducted DDoS attacks targeting Moldova in collaboration with allies.
  • June 6, 2024: Executed DDoS attacks targeting the European Parliament elections alongside allies.
  • July 8, 2024: Joined the "7 October Union" alliance, encompassing over 40 hacker groups.
  • July 15, 2024: Launched cyberattacks targeting Japan.
  • July 22, 2024: Conducted DDoS attacks targeting Spain with allies. The group became part of the Holy League, an alliance formed by High Society and the 7 October Union, now comprising over 70 hacker groups targeting NATO, Europe, Ukraine, and Israel.

Alliances and Collaborations

Alliances

NoName057(16) has forged alliances with several pro-Russian and anti-Israel/pro-Palestine hacker groups, significantly enhancing their operational capabilities. Key allies include:

  • 22С
  • SKILLNET
  • CyberDragon
  • Federal Legion
  • Horus Team
  • Digital Revolt
  • Unknowns group
  • NIGHTMARE
  • Russian Cyber Army Team
  • PHOENIX
  • Server Killers
  • Coup Team
  • Lulzsec Muslims
  • UserSec
  • ZulikGroup
  • HackNeT
  • Root@kali
  • NETWORK (15)
  • Azzasec
  • KyotoSH
  • CYBERVOLK
  • KaliHunt/Russia
  • PhantomGroup
  • Hacker Council Global
  • Alixsec
  • 7 October Union
  • Holy League

Joint Attacks

The group has increasingly participated in joint attacks with allies, targeting countries such as Ukraine, Finland, Italy, Japan, Sweden, Moldova, Luxembourg, Slovenia, Spain, Slovakia, Canada, UK, and more.

Impact and Implications

Targeted Nations and Sectors

NoName057(16) has targeted a wide range of nations across North America, Europe, and Asia. The Government & Public Sector, Financials, and Transport & Logistics sectors have been frequently attacked, indicating a focus on critical infrastructure. The group's organizational structure and alliances significantly enhance their ability to coordinate large-scale attacks, posing serious cybersecurity threats.

Strategic Implications

The group's systematic approach to building an army of volunteers and forming alliances signals a growing threat. Their activities suggest a need for coordinated international responses and enhanced cybersecurity measures.

Mitigation Strategies

Proactive Monitoring

Regularly monitor network traffic and employ advanced threat detection systems to identify and mitigate potential DDoS attacks early. Leveraging threat intelligence is crucial to staying updated on NoName057(16)'s evolving tactics and techniques.

Collaboration and Information Sharing

Enhance collaboration between national and international cybersecurity agencies to share information about emerging threats and attack patterns. Participation in cybersecurity forums and alliances is essential for strengthening collective defenses against NoName057(16) and similar groups.

Strengthening Cyber Defenses

Implement robust cybersecurity measures, including firewalls, intrusion detection systems, and DDoS protection services. Critical infrastructure and sensitive data should be protected with multi-layered security protocols.

Conclusion

Summary of Key Findings

NoName057(16) has demonstrated considerable organizational capabilities and has formed strategic alliances, enabling them to conduct frequent and impactful DDoS attacks. The analysis from January to July 2024 highlights their focus on Western institutions, with a significant number of attacks targeting government and public sectors across multiple continents. The group’s activities have shown a sophisticated approach to recruitment and collaboration, further enhancing their operational reach and effectiveness.

Future Outlook

Given their current trajectory, NoName057(16) is poised to continue expanding their operations and forming new alliances, thereby posing ongoing cybersecurity threats. Their methodical approach and established network of allies make them a persistent and evolving threat. Effective monitoring and proactive countermeasures will be essential in mitigating the risks posed by this group.

auth_img
Jacob Abraham
Share Article

Simplifying security and compliance at every stage

main_logoFalconFeeds.io
Enabling organisations take the big leap with comprehensive & advanced threat intelligence platform
Sign Up For Our Newsletter
Registered offices
London, UK
Delaware, USA
Banglore, India
Global Headquarters
Tsanct Technologies Pvt Ltd.
No. 21, 1st Cross, Achaiah Shetty Layout, RMV Extension, Bangalore Karnataka, India - 560080
linkedInlinkedInlinkedIn
Defend Today, Secure Tomorrow
© 2025 T-Sanct Technologies Pvt Ltd.