NoName057(16) Splinter Cells: Europe’s Volunteer DDoS Threat

Decentralized pro-Russian hacktivist cells execute targeted DDoS campaigns across Europe, leveraging volunteer botnets and pre-announced attacks to disrupt governments, banks, and public services, aligning with geopolitical objectives.
NoName057(16) Splinter Cells: Europe’s Volunteer DDoS Threat
Table of Contents
    Add a header to begin generating the table of contents

    NoName057(16) Splinter Cells represent a decentralized evolution of the original NoName057(16) pro-Russian hacktivist collective. Rather than operating as a single coordinated unit, these splinter cells function as semi-autonomous teams that share tooling, ideology, and targeting priorities while executing independent operations. Since late 2023, splinter activity has increased in scale and frequency, enabling sustained disruption campaigns against European governments, financial institutions, and public services supporting Ukraine.

    Aliases / Attribution

    • NoName057(16) (parent collective)
    • NoName Splinter Cells (analyst designation)
    • Pro-Russia DDoS Brigades (informal intelligence term)

    Attribution is assessed as state-aligned but not state-controlled, with operations consistently matching Russian strategic interests.

    Recent Victims of NoName057(16)

    • Polish government websites — sustained DDoS attacks disrupted public services following Poland’s announcement of additional military aid to Ukraine.
    • Czech banks and financial institutions — coordinated attacks intermittently disrupted online banking and customer portals.
    • Italian government and transport portals — targeted during NATO and EU political events to generate public disruption and media attention.
    • Nordic public sector organizations — repeatedly disrupted in campaigns framed as retaliation for regional support of Ukraine.

    NoName057(16) Tactics, Techniques & Procedures (TTPs)

    • DDOSIA platform enabling volunteer-driven attack participation
    • Crowdsourced botnets using ideologically motivated participants
    • Pre-attack target announcements to amplify psychological impact
    • HTTP/S and TLS exhaustion floods to bypass basic rate limiting
    • Rapid infrastructure and channel rotation to evade takedowns

    MITRE ATT&CK® Mapping of NoName057(16)

    ATT&CK TacticTechnique IDTechnique NameHow It Is Used
    ReconnaissanceT1595Active ScanningIdentifies exposed web services and application endpoints prior to DDoS campaigns.
    Resource DevelopmentT1584Compromise InfrastructureUses volunteer endpoints and transient VPS infrastructure to generate attack traffic.
    Command and ControlT1071.001Application Layer Protocol: WebCoordinates attacks over HTTP/HTTPS using centralized tasking servers and Telegram-distributed targets.
    ImpactT1499.004Endpoint Denial of Service: Application Exhaustion FloodSustained HTTP/S floods and TLS exhaustion attacks against government and financial portals.
    ImpactT1499.003Endpoint Denial of Service: Network FloodVolumetric traffic floods during high-visibility political events.
    InfluenceT1646Influence CampaignsPublicly claims attacks, pre-announces targets, and amplifies geopolitical narratives via Telegram.

    Related Posts