Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Operation Eastwood: Inside the Takedown of NoName057(16)

21:17
 
Share
 

Manage episode 494985342 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency incentives, and Telegram coordination.

In this episode, we unpack:

  • Who NoName057(16) is—and how their DDoS-for-crypto campaign operated
  • The gamification of cyberwarfare, where young sympathizers earn crypto and badges for attacking government targets
  • How Operation Eastwood led to arrests, infrastructure takedowns, and international arrest warrants
  • Why DDoS remains a go-to weapon for hacktivists and state-aligned cyber actors
  • The role of crypto on both sides of the Russia-Ukraine cyber conflict, from donations to evasion to digital mercenaries
  • Why hacktivist groups are blurring the lines between ideology and cybercrime, and how they're increasingly operating like decentralized ransomware gangs

We also explore the long-term implications:

  • Can law enforcement really stop these groups?
  • What happens when attackers are shielded by national borders or political alignment?
  • And how should defenders prepare for digitally mobilized ideological threats with state-level reach?

This is cyberwar by proxy—crowdsourced, monetized, and harder than ever to pin down.

  continue reading

222 episodes

Artwork
iconShare
 
Manage episode 494985342 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency incentives, and Telegram coordination.

In this episode, we unpack:

  • Who NoName057(16) is—and how their DDoS-for-crypto campaign operated
  • The gamification of cyberwarfare, where young sympathizers earn crypto and badges for attacking government targets
  • How Operation Eastwood led to arrests, infrastructure takedowns, and international arrest warrants
  • Why DDoS remains a go-to weapon for hacktivists and state-aligned cyber actors
  • The role of crypto on both sides of the Russia-Ukraine cyber conflict, from donations to evasion to digital mercenaries
  • Why hacktivist groups are blurring the lines between ideology and cybercrime, and how they're increasingly operating like decentralized ransomware gangs

We also explore the long-term implications:

  • Can law enforcement really stop these groups?
  • What happens when attackers are shielded by national borders or political alignment?
  • And how should defenders prepare for digitally mobilized ideological threats with state-level reach?

This is cyberwar by proxy—crowdsourced, monetized, and harder than ever to pin down.

  continue reading

222 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play