📢 Gate Square #Creator Campaign Phase 2# is officially live!
Join the ZKWASM event series, share your insights, and win a share of 4,000 $ZKWASM!
As a pioneer in zk-based public chains, ZKWASM is now being prominently promoted on the Gate platform!
Three major campaigns are launching simultaneously: Launchpool subscription, CandyDrop airdrop, and Alpha exclusive trading — don’t miss out!
🎨 Campaign 1: Post on Gate Square and win content rewards
📅 Time: July 25, 22:00 – July 29, 22:00 (UTC+8)
📌 How to participate:
Post original content (at least 100 words) on Gate Square related to
Europol Dismantles Pro-Russian NoName057(16) Hacktivist Network
HomeNews* Authorities disrupted the infrastructure of the pro-Russian hacktivist group NoName057(16) in a global operation.
The sweep, called Operation Eastwood, struck at NoName057(16) after it organized attacks against Ukraine and its partners using an online tool called DDoSia. The group rewarded participants with cryptocurrency payments. Five Russian suspects, including Andrey Muravyov, Maxim Nikolaevich Lupin, Olga Evstratova, Mihail Evgeyevich Burlakov, and Andrej Stanislavovich Avrosimow, were added to the EU Most Wanted list. “BURLAKOV is suspected of being a central member of the group…making a significant contribution to performing DDoS attacks on various institutions in Germany and other countries,” Europol stated.
The group, active since March 2022 after Russia’s invasion of Ukraine, reportedly gathered a network of over 4,000 online participants. They constructed a botnet—a network of hijacked servers—to boost the scale and strength of attacks. Europol noted the group used “gamified” rewards like leaderboards and badges to keep volunteers engaged and frame their actions in political terms.
According to Europol, NoName057(16) targeted Swedish authorities, German businesses, and banks in more than a dozen waves of attacks since late 2023. In July 2023, authorities in Spain arrested three individuals accused of attacking public institutions and critical sectors in NATO countries.
Recent activity suggests Russian hacktivist groups, such as Z-Pentest, Dark Engine, and Sector 16, are increasingly focusing on critical infrastructure. Authorities say these groups coordinate messaging and timing to align with strategic objectives, showing a deliberate effort to support Russian cyber goals.
Previous Articles: