Three individuals were apprehended by Spanish police on July 20, 2024, suspected of engaging in a string of cyberattacks targeting critical infrastructure and government establishments not only in Spain but also in other NATO member countries.
The detainees are believed to have affiliations with the hacktivist group NoName057(16), recognized for its pro-Russian stance and for conducting DDoS attacks against organizations that support Ukraine amid the ongoing conflict in the region.
Recent tensions between Russia and the West have escalated concerns regarding cyberwarfare, propelling law enforcement to take swift action against suspected threat actors. The Spanish Civil Guard, as reported by Reuters, highlighted that the cyberattacks orchestrated by NoName057(16) were specifically aimed at public institutions and businesses in strategic sectors within NATO countries that have extended aid to Ukraine in their time of need.
The operation leading to the arrest of the suspects was spearheaded by the Spanish Civil Guard, spanning across multiple cities in Spain including Mallorca, Huelva, and Seville. Searches at their residences unveiled crucial computer equipment and documents that are believed to be linked to the cyberattacks. Notably, a video released by Spanish police showcased a raid at one of the suspect’s homes where a Soviet-era hammer and sickle flag adorned the wall, hinting at their alleged pro-Russian motives.
Initial investigations indicate that NoName057(16) predominantly utilizes Distributed Denial-of-Service (DDoS) attacks to disrupt their targets’ online presence. These attacks flood websites or online services with irrelevant traffic, rendering them unusable for legitimate users. While the precise impact of these attacks is still being scrutinized, it is highly likely that they caused disruptions to the targeted organizations and potentially hindered their regular operations.
Spanish authorities, referencing the group’s manifesto, mentioned the objective of NoName057(16) was to retaliate against what they perceive as “hostile and openly anti-Russian actions by Western Russophobes.”
NoName057(16) emerged post Russia’s invasion of Ukraine and has since been connected to cyberattacks against various NATO countries, including Poland. In a recent incident in January 2024, the group claimed responsibility for a series of DDoS attacks targeting Swiss government websites on the eve of peace talks between Russia and Ukraine. The websites of federal government entities and organizations involved in the peace negotiations were among the targets.
Cybersecurity firms in Poland have also reported an increase in cyberattacks stemming from suspected pro-Russian entities. A report by Check Point Software Technologies unveiled that Polish entities face an average of nearly 1,430 cyberattacks per week, with NoName057(16) being identified as the most active pro-Russian group targeting Polish infrastructure.
The arrests in Spain signify a substantial step towards countering cyber threats associated with the conflicts in Ukraine. The investigation into NoName057(16)’s activities is ongoing, with Spanish authorities collaborating with specialized entities to fully uncover the extent of the group’s operations and identify any additional individuals involved.
The aftermath of NoName057(16)’s attacks remains subject to investigation. However, even brief disruptions to crucial services can have severe repercussions on healthcare, power grids, and communication networks that depend heavily on functional IT systems. The use of a homemade DDoS program named “DDoSia” by the group raises concerns about the potential accessibility of such tools to non-state actors, emphasizing the urgent need for robust cybersecurity measures by governments and businesses.
While the crackdown on NoName057(16) by Spanish authorities is commendable, it serves as a stark reminder of the ever-evolving cyber threats and the necessity for continuous vigilance in navigating the dynamic digital landscape. Media outlets emphasize the importance of using this information for reference purposes only, as users carry full responsibility for their reliance on the provided data. The Cyber Express disclaims any liability for the accuracy or consequences of utilizing this information.

