Article Details
Scrape Timestamp (UTC): 2026-01-19 18:00:46.933
Original Article Text
Click to Toggle View
UK govt. warns about ongoing Russian hacktivist group attacks. The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the country in disruptive denial-of-service (DDoS) attacks. The attacks are aimed at taking websites offline and disabling services, the UK's National Cyber Security Centre (NCSC) says in an alert today. Despite lacking sophistication, a DDoS attack can cause high costs for a targeted organization. "Although DoS attacks are typically low in sophistication, a successful attack can disrupt entire systems, costing organisations significant time, money, and operational resilience by having to analyse, defend against, and recover from them," the cyber agency notes. The NCSC refers to a particular DDoS threat actor, the infamous NoName057(16), known as a pro-Russian hacktivist group that has been active since March 2022. The actor is operating the DDoSia project, a platform that allows volunteers to contribute computing resources to carry out crowdsourced DDoS attacks and receive monetary rewards or recognition from the community. An international law enforcement operation dubbed "Operation Eastwood" disrupted NoName057(16)'s activity in mid-July 2025 by arresting two members of the group, issuing eight arrest warrants, and taking down 100 servers. However, with the main operators of the group out of reach, believed to be residing in Russia, the cybercriminals were able to return to action, as corroborated by the NCSC’s latest bulletin. The agency notes that NoName057(16) is ideologically motivated rather than driven by financial gain, and represents an evolving threat that is also affecting operational technology (OT) environments. A dedicated security guide for OT owners is shared here. To mitigate DDoS risks, the NCSC advises organizations to: Russian hacktivists have represented an increased threat since 2022, as the threat actors are targeting organizations in the public and private sectors in NATO member states and other countries in Europe that take a stance against "Russia’s geopolitical ambitions." The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.
Daily Brief Summary
The UK government has issued a warning about Russian-aligned hacktivist groups targeting critical infrastructure and local government entities with DDoS attacks.
These attacks, while lacking sophistication, can disrupt systems and incur significant financial and operational costs for affected organizations.
The group NoName057(16), active since March 2022, is behind the DDoSia project, leveraging volunteer resources for crowdsourced attacks.
An international law enforcement operation, "Operation Eastwood," temporarily disrupted the group in July 2025, arresting members and dismantling servers.
Despite these efforts, the group's main operators remain active, continuing their ideologically motivated attacks from Russia.
The National Cyber Security Centre (NCSC) has shared a security guide for operational technology owners to mitigate DDoS risks.
Russian hacktivists have increasingly targeted public and private sectors in NATO countries and others opposing Russia's geopolitical ambitions.