Justice Department Takes Bold Steps to Tackle Russian State-Sponsored Cyber Crime: Key Actions Against Two Major Hacking Groups Revealed

Admin

Justice Department Takes Bold Steps to Tackle Russian State-Sponsored Cyber Crime: Key Actions Against Two Major Hacking Groups Revealed

The Justice Department has charged Victoria Eduardovna Dubranova, a 33-year-old Ukrainian national, for her involvement in cyberattacks targeting critical infrastructure worldwide. Dubranova, also known as Vika, Tory, and SovaSonya, was extradited to the U.S. this year. She faces two indictments: one for her work with the group CyberArmyofRussia_Reborn (CARR), and another with NoName057(16) (NoName). Dubranova has pleaded not guilty in both cases. Her trial related to NoName is scheduled for February 3, 2026, and for CARR on April 7, 2026.

The indictments reveal that the Russian government backed these groups with financial support. This funding allowed CARR to access various cybercriminal services, while NoName developed its own cyberattack tools. The Assistant Attorney General for National Security, John A. Eisenberg, emphasized the commitment to countering threats to essential services, like water and food systems, from these cyber activities.

Experts believe that groups like CARR and NoName pose significant threats to national security. Bill Essayli, First Assistant U.S. Attorney for the Central District of California, highlighted the risks posed by politically motivated hacktivists—especially those operating under state supervision. He noted that these groups often use civilian volunteers to hide their cyber activities, which can seriously undermine U.S. interests.

In recent years, cyber threats have escalated. According to a report by Cybersecurity & Infrastructure Security Agency (CISA), cybercriminals increasingly target critical infrastructure. In 2022 alone, nearly 80% of U.S. organizations reported experiencing a cyber-attack. These incidents not only disrupt essential services but can also cause physical harm, as seen in some cases linked to CARR.

CARR has claimed responsibility for numerous attacks, including on U.S. water systems, causing considerable damage. They focus on DDoS attacks, which overwhelm and shut down servers. This group, led by Russia’s military intelligence (GRU), boasts a large following on Telegram and encourages volunteers to join their cause.

Meanwhile, NoName has developed its attack programs and targets entities such as government agencies and financial institutions. By recruiting volunteers worldwide, they leverage everyday computers for their cyber assaults. Top performers in these operations have even been rewarded in cryptocurrency.

As the U.S. government tightens its grip on cyber threats, it has offered rewards of up to $10 million for information on individuals linked to these groups. The FBI and other agencies remain vigilant, sharing guidance on how pro-Russia hacktivists target poorly protected systems, especially those connected to critical infrastructure.

The repercussions of these actions underline the importance of cybersecurity. Governments must continually adapt to combat the evolving nature of these threats. The message is clear: attacks on critical infrastructure—whether by state-backed groups or rogue hackers—will be met with serious justice efforts.

For further information on cybersecurity trends and measures, refer to sources like the Cybersecurity & Infrastructure Security Agency (CISA).



Source link