US Justice Department Cracks Down on Russian Cyber Hacking Groups

0
8
US Justice Department Cracks Down on Russian Cyber Hacking Groups

Key Takeaways:

  • The Justice Department has announced two indictments against Ukrainian national Victoria Eduardovna Dubranova for her role in conducting cyberattacks and computer intrusions against critical infrastructure and other victims around the world.
  • Dubranova is accused of supporting two Russian-backed groups, CyberArmyofRussia_Reborn (CARR) and NoName057(16) (NoName), which conducted hundreds of cyberattacks against victims worldwide.
  • The groups targeted critical infrastructure, including public drinking water systems, meat processing facilities, and election infrastructure, in support of Russia’s geopolitical interests.
  • Dubranova faces up to 27 years in federal prison if convicted of the charges related to CARR and up to 5 years in federal prison if convicted of the charges related to NoName.
  • The U.S. Department of State has offered rewards of up to $2 million for information on individuals associated with CARR and up to $10 million for information on individuals associated with NoName.

Introduction to the Indictments
The Justice Department has announced two indictments against Ukrainian national Victoria Eduardovna Dubranova, also known as Vika, Tory, and SovaSonya, for her role in conducting cyberattacks and computer intrusions against critical infrastructure and other victims around the world. Dubranova was extradited to the United States earlier this year on an indictment charging her for her actions supporting CyberArmyofRussia_Reborn (CARR). Today, Dubranova was arraigned on a second indictment charging her for her actions supporting NoName057(16) (NoName). Dubranova pleaded not guilty in both cases and is scheduled to begin trial in the NoName matter on February 3, 2026, and in the CARR matter on April 7, 2026.

The Russian Government’s Involvement
As described in the indictments, the Russian government backed CARR and NoName by providing financial support, among other things. CARR used this financial support to access various cybercriminal services, including subscriptions to distributed denial of service-for-hire services. NoName was a state-sanctioned project administered in part by an information technology organization established by order of the President of Russia in October 2018. This organization developed, along with other co-conspirators, NoName’s proprietary distributed denial of service (DDoS) program. The Russian government’s involvement in these groups highlights the country’s continued efforts to disrupt and undermine the critical infrastructure of other nations.

The Threat Posed by CARR and NoName
The indictments highlight the significant threat posed by CARR and NoName to critical infrastructure and national security. CARR claimed credit for hundreds of cyberattacks against victims worldwide, including attacks against critical infrastructure in the United States, in support of Russia’s geopolitical interests. NoName also claimed credit for hundreds of cyberattacks against victims worldwide, including government agencies, financial institutions, and critical infrastructure. The groups’ use of DDoS attacks and other cybercriminal services has resulted in significant damage to critical infrastructure, including public drinking water systems and meat processing facilities.

The Investigation and Prosecution
The FBI Los Angeles Field Office investigated the CARR and NoName cases as part of FBI’s Operation Red Circus, an ongoing operation to disrupt Russian state-sponsored cyber threats to U.S. critical infrastructure and interests abroad. Assistant U.S. Attorneys Angela Makabali and Alexander Gorin for the Central District of California and Trial Attorney Greg Nicosia of the National Security Division’s National Security Cyber Section are prosecuting these cases. The Justice Department’s Office of International Affairs provided significant assistance for both investigations. The U.S. Department of State has also offered rewards for information on individuals associated with CARR and NoName.

The Consequences of the Indictments
The indictments against Dubranova and the rewards offered by the U.S. Department of State demonstrate the U.S. government’s commitment to disrupting and dismantling Russian state-sponsored cyber threats. The consequences of these indictments are significant, with Dubranova facing up to 27 years in federal prison if convicted of the charges related to CARR and up to 5 years in federal prison if convicted of the charges related to NoName. The rewards offered by the U.S. Department of State also highlight the government’s efforts to encourage individuals to come forward with information about CARR and NoName.

Conclusion
In conclusion, the indictments against Dubranova and the rewards offered by the U.S. Department of State demonstrate the U.S. government’s commitment to disrupting and dismantling Russian state-sponsored cyber threats. The threat posed by CARR and NoName is significant, and the U.S. government is taking steps to hold individuals accountable for their actions. The investigation and prosecution of these cases highlight the importance of international cooperation and the need for continued efforts to disrupt and dismantle Russian state-sponsored cyber threats. As Assistant Attorney General for National Security John A. Eisenberg stated, "Today’s actions demonstrate the Department’s commitment to disrupting malicious Russian cyber activity — whether conducted directly by state actors or their criminal proxies — aimed at furthering Russia’s geopolitical interests."

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here