• Home
  • News
  • NoName Continues Its Ukrainian Campaign

NoName Continues Its Ukrainian Campaign

Bogdan Pătru

By Bogdan Pătru . 2 April 2024

Tech Writer

Alex Popa

Fact-Checked this

NoName announced another DDoS operation against Ukrainian targets. Two of the targets are the same as the last time, the Kiev Metro and the Informational portal of the city of Kiev.

  • The other targets are the National Academy of the Security Service, the National Security and Defense Council, and the Zaporozhtransformator (ZTR)
  • No Ukrainian official has commented on the breaches, but a public statement is expected, given NoName’s relentless cyber-hacking campaign
  • DDoS attacks have increased against Ukraine drastically since the beginning of the Russian invasion
  • NoName has been at the forefront of the cyber-hacking campaign against Ukraine and its allies

Cyberattacks are nothing new in the Rusi-Ukrainian war, with multiple pro-Russian organizations conducting numerous operations against Ukraine. NoName appears to be the most active, hitting several targets daily and taking no day off.

NoName has been found responsible for hundreds of cyberattacks since its first public appearance in March of 2022. Some analysts suggest over 1,500 attacks or more, all against Ukraine and its allies.

The group’s resources, power, and modern tools and tactics allow it to perform multiple DDoS operations per day.

X showing the NoName attack on Ukraine
https://twitter.com/FalconFeedsio/status/1775085767963869202

According to anonymous sources, NoName operates on an almost military-like discipline level. The hackers are required to assess, probe, and attack up to 15 targets per day or more, and they don’t take the weekends off.

This explains why most news about NoName attacks mentions at least 4-5 victims. This level of commitment, resources, technical ability, and manpower recommend NoName as the most dangerous in the ransomware sphere.

Our Mission

We believe security online security matters and its our mission to make it a safer place.

What Makes NoName So Dangerous?

NoName currently ranks as the most active, resourceful, and dangerous pro-Russian organization for a variety of reasons. One of them is the fact that NoName often doesn’t operate alone.

The group will frequently join forces with other pro-Russian cybercriminal groups to orchestrate more in-depth operations against high-value and well-defended targets. They also often rely on affiliates to extend their reach and increase the body count.

NoName also appears to be highly resourceful and well-funded, to the point of some linking the gang to the Russian government itself. This wouldn’t be a first, given that Russia has often relied on DDoS groups to orchestrate attacks.

NoName is also highly motivated and well-versed in cyber warfare. The gang has been extremely active since March 2022, targeting Ukraine and its allies relentlessly over the last 2 years.

The typical method of attack is the bot flood via DDoS, but NoName has also resorted to multiple other methods. These include sending threatening letters to intimidate targets, spreading propaganda, and using disinformation and defamation to ruin the victims’ reputations.

NoName does all this to both discredit and silence victims, as well as push their ideological views. The gang has stated its pro-Russian affinities with its first public post and has reinforced them with every attack since.

When it comes to the typical victim’s profile, NoName prefers to target public institutions, as their war is with each target country’s government. But the gang will also hit private corporations if they perceive them as either anti-Russia or pro-Ukrainian.

Leave a Comment