📢 Exclusive on Gate Square — #PROVE Creative Contest# is Now Live!
CandyDrop × Succinct (PROVE) — Trade to share 200,000 PROVE 👉 https://www.gate.com/announcements/article/46469
Futures Lucky Draw Challenge: Guaranteed 1 PROVE Airdrop per User 👉 https://www.gate.com/announcements/article/46491
🎁 Endless creativity · Rewards keep coming — Post to share 300 PROVE!
📅 Event PeriodAugust 12, 2025, 04:00 – August 17, 2025, 16:00 UTC
📌 How to Participate
1.Publish original content on Gate Square related to PROVE or the above activities (minimum 100 words; any format: analysis, tutorial, creativ
Europol Dismantles Pro-Russian NoName057(16) Hacktivist Network
HomeNews* Authorities disrupted the infrastructure of the pro-Russian hacktivist group NoName057(16) in a global operation.
The sweep, called Operation Eastwood, struck at NoName057(16) after it organized attacks against Ukraine and its partners using an online tool called DDoSia. The group rewarded participants with cryptocurrency payments. Five Russian suspects, including Andrey Muravyov, Maxim Nikolaevich Lupin, Olga Evstratova, Mihail Evgeyevich Burlakov, and Andrej Stanislavovich Avrosimow, were added to the EU Most Wanted list. “BURLAKOV is suspected of being a central member of the group…making a significant contribution to performing DDoS attacks on various institutions in Germany and other countries,” Europol stated.
The group, active since March 2022 after Russia’s invasion of Ukraine, reportedly gathered a network of over 4,000 online participants. They constructed a botnet—a network of hijacked servers—to boost the scale and strength of attacks. Europol noted the group used “gamified” rewards like leaderboards and badges to keep volunteers engaged and frame their actions in political terms.
According to Europol, NoName057(16) targeted Swedish authorities, German businesses, and banks in more than a dozen waves of attacks since late 2023. In July 2023, authorities in Spain arrested three individuals accused of attacking public institutions and critical sectors in NATO countries.
Recent activity suggests Russian hacktivist groups, such as Z-Pentest, Dark Engine, and Sector 16, are increasingly focusing on critical infrastructure. Authorities say these groups coordinate messaging and timing to align with strategic objectives, showing a deliberate effort to support Russian cyber goals.
Previous Articles: