LmCast :: Stay tuned in

UK govt. warns about ongoing Russian hacktivist group attacks

Recorded: Jan. 19, 2026, 8:04 p.m.

Original Summarized

UK govt. warns about ongoing Russian hacktivist group attacks

News

Featured
Latest

StealC hackers hacked as researchers hijack malware control panels

Hackers now exploiting critical Fortinet FortiSIEM flaw in attacks

Malicious GhostPoster browser extensions found with 840,000 installs

Cisco finally fixes AsyncOS zero-day exploited since November

UK govt. warns about ongoing Russian hacktivist group attacks

Hacker admits to leaking stolen Supreme Court data on Instagram

Jordanian pleads guilty to selling access to 50 corporate networks

Ingram Micro says ransomware attack affected 42,000 people

Tutorials

Latest
Popular

How to access the Dark Web using the Tor Browser

How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11

How to use the Windows Registry Editor

How to backup and restore the Windows Registry

How to start Windows in Safe Mode

How to remove a Trojan, Virus, Worm, or other Malware

How to show hidden files in Windows 7

How to see hidden files in Windows

Webinars
Downloads

Latest
Most Downloaded

Qualys BrowserCheck

STOPDecrypter

AuroraDecrypter

FilesLockerDecrypter

AdwCleaner

ComboFix

RKill

Junkware Removal Tool

Deals

Categories

eLearning

IT Certification Courses

Gear + Gadgets

Security

VPNs

Popular

Best VPNs

How to change IP address

Access the dark web safely

Best VPN for YouTube

Forums
More

Virus Removal Guides
Startup Database
Uninstall Database
Glossary
Send us a Tip!
Welcome Guide

HomeNewsSecurityUK govt. warns about ongoing Russian hacktivist group attacks

UK govt. warns about ongoing Russian hacktivist group attacks

By Bill Toulas

January 19, 2026
12:20 PM
0

The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the country in disruptive denial-of-service (DDoS) attacks.
The attacks are aimed at taking websites offline and disabling services, the UK's National Cyber Security Centre (NCSC) says in an alert today. Despite lacking sophistication, a DDoS attack can cause high costs for a targeted organization.
"Although DoS attacks are typically low in sophistication, a successful attack can disrupt entire systems, costing organisations significant time, money, and operational resilience by having to analyse, defend against, and recover from them," the cyber agency notes.

The NCSC refers to a particular DDoS threat actor, the infamous NoName057(16), known as a pro-Russian hacktivist group that has been active since March 2022.
The actor is operating the DDoSia project, a platform that allows volunteers to contribute computing resources to carry out crowdsourced DDoS attacks and receive monetary rewards or recognition from the community.
An international law enforcement operation dubbed "Operation Eastwood" disrupted NoName057(16)'s activity in mid-July 2025 by arresting two members of the group, issuing eight arrest warrants, and taking down 100 servers.
However, with the main operators of the group out of reach, believed to be residing in Russia,  the cybercriminals were able to return to action, as corroborated by the NCSC’s latest bulletin.
The agency notes that NoName057(16) is ideologically motivated rather than driven by financial gain, and represents an evolving threat that is also affecting operational technology (OT) environments. A dedicated security guide for OT owners is shared here.
To mitigate DDoS risks, the NCSC advises organizations to:
Understand their services to identify potential resource-exhaustion points and responsibility boundaries.
Strengthen upstream defenses, including ISP mitigations, third-party DDoS protection, CDNs, and provider-imposed safeguards, and consider redundancy with multiple providers.
Design for rapid scaling, using cloud auto-scaling or virtualization with spare capacity.
Define and rehearse response plans that support graceful degradation, adapt to changing attacker tactics, retain admin access, and ensure scalable fallbacks for essential services.
Test and monitor continuously to detect attacks early and validate the effectiveness of defenses.
Russian hacktivists have represented an increased threat since 2022, as the threat actors are targeting organizations in the public and private sectors in NATO member states and other countries in Europe that take a stance against "Russia’s geopolitical ambitions." 

7 Security Best Practices for MCP
As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.
This free cheat sheet outlines 7 best practices you can start using today.
Download Now

Related Articles:
Palo Alto Networks warns of DoS bug letting hackers disable firewallsNew Windows RasMan zero-day flaw gets free, unofficial patchesAisuru botnet behind new record-breaking 29.7 Tbps DDoS attackNew SonicWall SonicOS flaw allows hackers to crash firewallsThe biggest cybersecurity and cyberattack stories of 2025

DDoS
Denial of Service
Distributed Denial-of-Service
DoS
Hacktivism
NCSC

Bill Toulas
Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.

Previous Article

Post a Comment Community Rules

You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Popular Stories

Microsoft: Some Windows PCs fail to shut down after January update

Microsoft: Windows 11 update causes Outlook freezes for POP users

StealC hackers hacked as researchers hijack malware control panels

Sponsor Posts

Discover how to scale IT infrastructure reliably without adding toil or burnout.

New webinar: Choose-your-own-investigation walkthrough of modern browser attacks

  Upcoming Webinar

Follow us:

Main Sections

News
Webinars
VPN Buyer Guides
SysAdmin Software Guides
Downloads
Virus Removal Guides
Tutorials
Startup Database
Uninstall Database
Glossary

Community

Forums
Forum Rules
Chat

Useful Resources

Welcome Guide
Sitemap

Company

About BleepingComputer
Contact Us
Send us a Tip!
Advertising
Write for BleepingComputer
Social & Feeds
Changelog

Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure

Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved

Login

Username

Password

Remember Me

Sign in anonymously

Sign in with Twitter

Not a member yet? Register Now


Reporter

Help us understand the problem. What is going on with this comment?

Spam

Abusive or Harmful

Inappropriate content

Strong language

Other

Read our posting guidelinese to learn what content is prohibited.

Submitting...
SUBMIT

The UK government has issued a formal warning regarding sustained cyberattacks conducted by Russian-aligned hacktivist groups, specifically highlighting the activities of NoName057(16), a pro-Russian collective that has been engaged in disruptive denial-of-service (DDoS) campaigns since March 2022. According to the National Cyber Security Centre (NCSC), these attacks target critical infrastructure and local government entities, aiming to disable online services and disrupt operations. While DDoS attacks are generally considered low-sophistication threats, their impact can be severe, leading to significant financial and operational losses for affected organizations. The NCSC emphasized that even seemingly simple attacks can overwhelm systems, necessitating extensive resources for mitigation and recovery. The agency’s alert underscores the growing concern over the persistence of such threats, particularly in the context of geopolitical tensions exacerbated by Russia’s actions in Ukraine and its broader influence in Europe.

NoName057(16) operates through the DDoSia project, a crowdsourced platform that enables volunteers to contribute computing resources to launch coordinated DDoS attacks. Participants receive monetary incentives or community recognition, fostering a decentralized network of attackers. This model allows the group to scale its operations while minimizing direct exposure for its core members. The NCSC has identified this group as ideologically driven rather than motivated by financial gain, distinguishing it from traditional cybercriminal enterprises. However, the group’s activities have evolved beyond conventional IT systems, extending into operational technology (OT) environments, which govern critical physical infrastructure such as power grids and industrial control systems. The NCSC has published a dedicated security guide for OT owners, reflecting the increasing complexity of threats targeting both digital and physical systems.

The threat posed by NoName057(16) was temporarily disrupted in mid-July 2025 through an international law enforcement operation called “Operation Eastwood.” This initiative resulted in the arrest of two group members, the issuance of eight arrest warrants, and the takedown of 100 servers associated with DDoSia. Despite these efforts, the NCSC acknowledges that the group’s primary operators remain at large, believed to be based in Russia. This resilience has allowed NoName057(16) to resume its activities, as evidenced by the latest NCSC bulletin. The agency attributes this recurrence to the group’s decentralized structure and the challenges of prosecuting cybercriminals operating across international jurisdictions. The lack of legal accountability for key members further enables the group to continue its campaigns, highlighting the limitations of current cybersecurity and law enforcement frameworks in addressing state-sponsored or ideologically motivated hacktivism.

The NCSC’s advisory outlines specific measures to mitigate DDoS risks, emphasizing proactive strategies for organizations. These include a thorough understanding of service dependencies to identify vulnerabilities in resource allocation and system architecture. Organizations are encouraged to strengthen upstream defenses by leveraging internet service providers (ISPs) for mitigation, third-party DDoS protection services, content delivery networks (CDNs), and provider-imposed safeguards. Redundancy is another critical recommendation, with the NCSC suggesting multiple providers to ensure continuity during attacks. Additionally, the agency advises designing systems for rapid scalability, utilizing cloud auto-scaling or virtualization to handle sudden traffic surges. Response planning is also highlighted as essential, with organizations urged to develop and regularly test protocols for graceful degradation, adaptability to evolving attack tactics, and the maintenance of administrative access. Continuous monitoring and testing are stressed as necessary components to detect threats early and validate the effectiveness of defensive measures.

The threat landscape has intensified since 2022, with Russian-aligned hacktivists increasingly targeting organizations in NATO member states and other European countries that oppose Russia’s geopolitical ambitions. This pattern reflects a broader strategy of using cyberattacks as tools of intimidation and influence, particularly in the context of Russia’s military actions in Ukraine. The NCSC notes that these attacks are not confined to the digital realm; they often aim to destabilize public services, erode trust in institutions, and create a climate of uncertainty. The group’s focus on local governments and critical infrastructure underscores the potential for cascading effects, where disruptions in one sector can reverberate across others. For instance, a DDoS attack on a regional healthcare provider could delay emergency services, while an outage in a transportation system might disrupt supply chains.

The ideological motivations of NoName057(16) further complicate efforts to counter its activities. Unlike financially driven cybercriminals, the group’s actions are rooted in political and social motivations, making it less susceptible to traditional deterrents such as financial penalties or ransom demands. This dynamic raises questions about the effectiveness of existing cybersecurity policies, which often prioritize economic impacts over ideological threats. The NCSC’s emphasis on OT environments suggests a growing awareness of the need to protect systems that bridge digital and physical domains, where failures can have tangible consequences. However, the agency’s recommendations remain largely technical, leaving broader strategic and diplomatic challenges unaddressed.

The article also touches on the broader context of cybersecurity threats, including mentions of other vulnerabilities and attacks referenced in related sections. For example, the text notes a critical flaw in Fortinet’s FortiSIEM product being exploited, as well as the discovery of malicious browser extensions with millions of installs. These examples illustrate the multifaceted nature of modern cyber threats, where hacktivist groups like NoName057(16) operate alongside other malicious actors. However, the focus of the NCSC’s warning remains squarely on DDoS attacks and their implications for national security. The agency’s bulletin serves as a reminder of the persistent risks posed by state-sponsored and ideologically driven cyber activities, even as technological defenses evolve.

The article’s author, Bill Toulas, a tech writer and infosec news reporter with over a decade of experience, provides a concise yet comprehensive overview of the threat. His reporting highlights the intersection of cybersecurity and geopolitics, emphasizing how cyberattacks are increasingly used as extensions of traditional conflict. The piece also references related articles, such as warnings about DoS vulnerabilities in firewalls and records of large-scale DDoS attacks, reinforcing the urgency of the NCSC’s advisory. However, the core message remains focused on NoName057(16), its methods, and the need for organizations to adopt robust defensive strategies.

In conclusion, the UK government’s warning about Russian-aligned hacktivist attacks underscores the evolving nature of cyber threats in an increasingly interconnected world. The NCSC’s detailed guidance reflects a proactive approach to mitigating DDoS risks, but the persistence of groups like NoName057(16) highlights the limitations of technical solutions alone. Addressing such threats requires a multifaceted strategy that combines advanced cybersecurity measures with diplomatic and policy initiatives. As the line between digital and physical security continues to blur, organizations must remain vigilant, adapting their defenses to counter both conventional and ideologically driven cyberattacks. The NCSC’s advisory serves as a critical resource for those tasked with safeguarding infrastructure, but the broader challenge of countering state-sponsored hacktivism remains a pressing concern for governments and private-sector entities alike.