Who is behind the Russian Cyber ​​Army and their attacks on international organizations?

27 January 2025 10 minutes Author: Cyber Witcher

A detailed analysis of the hacker group Noname057(16), known as the Russian Cyber ​​Army. The identities of the participants, their methods, and their connections to Russian state structures are revealed.

Who are they?

The hacker groups Russian Cyber ​​Army and Noname057(16) have been operating in parallel since late 2022. Noname057(16) created a project that includes the DDoSia malware, designed to carry out DDoS attacks, in particular against NATO countries. In September 2024, these groups probably merged into one structure. It is assumed that the project is funded by Russian state structures. A feature of their botnet is that it pays rewards to users for the resources provided for attacks. There is a series of attacks that are associated with these groups.

USA. Two individuals – Yulia Pankratova and Denis Degtyarenko – appear on the US sanctions lists, who are associated with Noname057(16). These documents also mention the name Cyber ​​Army of Russia Reborn (CARR). Despite the frequent mention of both names in the context of cyberattacks, the exact relationship between them is still under analysis.

Netherlands. In August 2023, the group carried out DDoS attacks on the websites of several Dutch organizations. In particular, the websites of the ports of Rotterdam, Amsterdam, Den Helder, and Groningen were disrupted, which remained inaccessible for several hours or even days. These attacks were a response to the Dutch plans to purchase Swiss tanks for Ukraine. The internal systems of the ports were not affected – only public websites were attacked.

In total, Noname057(16) carried out DDoS attacks on government and commercial websites in more than 15 countries, including Ukraine, Canada, the Baltic countries, Denmark, Germany, Norway, Poland, Finland, Italy, the Czech Republic, the United Kingdom, and others. The main targets were government institutions, banks, transport companies, media, and other objects. The attacks were politically motivated, as these countries supported Ukraine.

In their interviews published on Telegram, hackers Noname057(16) boast of creating an alliance of pro-Russian hackers called the Holly League, which opposes the “collective West” and the “deep state”. For example, in an interview with Spanish cyber expert Rafa Lopez for Bit Life Media, they quoted Russian poet Alexander Blok: “Millions are with you. We have darkness, darkness, and even more darkness. Try to fight us!”.

Yulia Pankratova also gave an interview to the blog KnightPentest, in which she noted that France was attacked twice: the first time – due to violations of Christian norms during the preparation for the 2024 Olympics, the second time – in support of Pavel Durov.

This group continues to pose a serious threat in cyberspace due to its politically motivated attacks.

List of members and administrators associated with DDoSia and Noname057(16)

Administrators

  1. @nn05716Роль: Administrator Full name: Панкратов Артем Владимирович

  2. @MotherOfBearsРоль: Administrator Full name: Журавлева / Панкратова Юлия Владимировна

  3. @vetal2020Роль: Administrator Full name: Прядка Виталий Виталиевич

  4. @Rabbn1Роль: Administrator Full name: Маскайкін Илья

  5. @simplusertgРоль: Administrator Full name: Осауленко Николай Дмитриевич

  6. @t96_kaРоль: Administrator Full name: Титов Кирилл Андреевич

  7. @tory12345666Роль: Administrator Full name: Дубранова Виктория Эдуардовна

  8. @Timea_RichРоль: Administrator Full name: Крайнов Александр Сергеевич

Учасники спільнот DDoSia та Noname057(16)

  1. @sturm_29Роль: Administrator Full name: Смородин Дмитрий Николаевич

  2. @Monaxxx666Роль: Administrator Full name: Шевляков Евгений Иванович

  3. @ArchLinuxrootuserРоль:Administrator Full name: Билялов Мурат Дамирович

Telegram channel administrators DDoSia and Noname057(16)

Pankratov Artem Vladimirovich (Russian: Панкратов Артем Владимирович)

The photo above shows a key member of the Russian Cyber ​​Army community / Noname057(16). He, together with his wife — Zhuravlyova / Pankratova Yulia (Telegram nickname — @MotherOfBears) — administers the corresponding group in Telegram. Artem was the founder of several legal entities (1, 2, 3, 4), which had KVEDs related to trade and construction. However, entrepreneurial activity could not help him get rid of debts. Currently, Pankratov is the owner of the company sipconstruct (instagram: inst), which specializes in construction.

This is what Pankratov’s Twitter account looks like

On social media, Artem mainly publishes Russian propaganda. Among his posts are also several publications where he talks about the success of the hacking attacks of the NoName057 community. On Telegram, he is subscribed to pro-Russian channels, such as “русская идея”, but at the same time is interested in topics related to emigration and is learning Spanish.

A comment in Spanish was discovered, left in the discussions of the group “Informa Pirata: informazione e notizie”, dedicated to cybersecurity and digital rights. In it, Artem wrote: “Here is the link to the Telegram channel of this group”, attaching a link to the Russian hacking community. This comment appeared during a discussion of the news about the DDoS attack of the NoName057 hackers on the website of the Italian Ministry of Defense. Probably, in this way he tried to advertise his community.

In addition, Artem is subscribed to the group “Canadian returnees”. He is actively trying to advertise his hacking community in various Telegram groups. Here’s what his ad looks like:

A screenshot of one of the messages in which Pankratov offers a reward for cooperation.

Personal data

Date of birth: 04/23/1984

Known addresses:

Social networks:

Emails:

Phone numbers:

  • +79945555499

  • +79271498929

  • +78452961555

  • +78452913231

Documents:

  • Passport: 322320313

  • TIN (Taxpayer Identification Number): 645116260584

  • SNIOR (Individual Personal Account Insurance Number): 11225845627

Pankratova (Zhuravlyova) Yulia Vladimirovna (Russian: Панкратова (Журавлева) Юлия Владимировна)

Yulia is the wife of the Russian hacker Artem Pankratov, mentioned earlier. According to available information, the couple got married last year. Yulia actively supports the activities of her hacker husband and is a member of Telegram groups associated with Russian propaganda and DDoS attacks. She works under the nickname MotherOfBears and administers the Telegram channel of the Russian hacker community DDosia.

Yulia is also a member of the chat “GeoPolitics of Civilizations”, where conspiracy theories are discussed and Russian propaganda is spread. Her name is mentioned in the lists of “Peacemaker”.

Personal data

  • Date of birth: 06.04.1984

  • Place of residence: Anapa

  • Known address: Moscow, Klyazminskaya Street, building 7, building 2, apt. 25

Social networks:

E-mail:

Phone numbers:

  • +79096606594

  • +79650611488

  • +79384217931

  • +79853920040

  • +79162301826

Documents:

Pryadka Vitaly Vitaliyovych (Russian: Pryadka Vitay Vitaliyovych)

Vitaliy is originally from Zaporizhia Oblast. His Telegram account has been active since 2021. According to available information, Vitaliy has previously been convicted of theft. In 2019, he visited Moscow.

His interests include gardening and marijuana. In Telegram, Vitaliy is a member of groups such as @baraholkabkm (Flea Market of the Autonomous Community: Kushugum, Balabyne, Maloekaterynivka) and @otgKushugum. It is also likely that Vitaliy owned or still owns a Chevrolet Lacetti.

Personal data

  • Date of birth: 29.03.1996

  • Known address: Zaporizhia region, Zaporizhia district, Malokaterinivka settlement

Social networks:

E-mail:

Ilya Maskaykin (Russian – Ilya Maskaykin)

A teenager from Russia, probably from Mordovia. He shows interest in supporting the Russian military and hacktivism. His interests also include the Russian Navy, fundraising (likely for the needs of the Russian military), malware, and conducting DDoS attacks. His Telegram account was registered in April 2023.

Personal data

Date of birth: 27.04.2006

Teaching:

  • As of December 2023, he was a student in grade 11

  • Educational institution: Lyceum of the Elnykovsky Municipal District

  • Achievements: Prize winner in history in the 2023-2024 academic year

Known address:

  • village of Mord. Maskkinski Vysilky, Zarichna st., building 33, apt. 2

Social networks:

  • VK

  • VK (alternative)

E-mail:

Phone number:

Osaulenko Nikolay Dmitrievich (Russian: Osaulenko Nikolay Dmitrievich)

Osaulenko considers his work extremely dangerous, claiming that “everything could end at any second.” However, as it turned out, this “dangerous” activity is related to work in state construction at the FSUE “Main Military Construction Administration for Special Objects.” This organization is engaged in the construction of special and often classified facilities, such as military bases, underground bunkers, strategic infrastructure, and other facilities with a high level of secrecy. Like other members, Osaulenko is part of the channel’s administration.

This account, from which he administers the DDoSia Project group, has belonged to him since 2024. Osaulenko is interested in network intelligence, doxing, penetration testing, and deanonymization. In addition, he is probably a member of hacker communities and reads the “Vaccination from Sex” group. There is also an assumption that he has a wife and child.

Personal data

Social networks:

E-mail:

Phone numbers:

Documents:

Vehicle:

Professional activity:

  • Work in 2019: Moscow branch of the FSUE “Main Military Construction Directorate for Special Facilities”

Titov Kyrylo Andreevich (Russian: Tytov Kirill Andreevich)

He has close ties to the DDoSia and Noname057(16) projects, and turned out to be a Russian “oppositionist” who in 2021 provided financial support to the Anti-Corruption Fund (FBK) headed by Navalny. This is Titov Kirill Andreyevich, who uses the nickname @t96_ka. He holds the position of administrator of the Telegram channel, which collects educational resources related to hacker attacks, including materials for the ddosiaproject.

Until 2021, Titov worked as an operator of electronic computers and computing machines at the BUZ of the Lyskinskaya District Hospital.

Personal data

  • Date of birth: 05/22/1996

  • Known address: Voronezh region, Lysky city, Sechenov st., building 45, apt. 1

Social networks:

E-mail:

Phone numbers:

Documents:

Dubranova Victoria Eduardovna (Russian: Дубранова Виктория Эдуардовна)

Victoria is a Ukrainian, probably originally from Dnipro. She claims to have a “Slavic soul” that finds it difficult to perceive communication in English. Victoria actively uses the Russian social network VK. Her personal email address [email protected] is registered on several Russian online platforms, such as avito.ru, bookmate.com, nnm-club.ru, text.ru, bitrix24.ru, plibber.ru (1, 2, 3).

In April 2016, she posted an image with a man and the flag of the USSR. The user under the nickname @tory12345666 is the administrator of a Telegram channel that collects educational materials for hacking ddosiaproject.

It seems that Victoria is one of those whose “Slavic soul” perceived the world through the prism of the Russian tricolor. In 2021, she posted links to petitions against mobilization on Facebook. In addition, a dramatic photo of the sky with barbed wire appeared in her feed.

Personal data

  • Date of birth: 12.08.1991

Social networks:

E-mail:

Telegram:

  • TG id: 6634849144

  • Nicknames: @viktorya_design, @tory12345666

Famous nicknames:

Oleksandr Sergeevich Kraynov (Russian: Oleksandr Sergeevich Kraynov)

The nickname @Timea_Rich is probably a Russian military man. The owner of this Telegram profile is probably Alexander Krainov, currently residing in Ivanovo, Ivanovo Oblast, Russia. Krainov served in the Russian Airborne Forces, in particular, in the 31st Separate Airborne Assault Brigade.

It is likely that Krainov is the owner of the cybersports media cyberivanovo, since his email is tied to the cyberivanovo.bitrix24.ru account. His probable IP address 80.70.96.55 is associated with the city of Kineshma, and his probable IP in the city of Ivanovo is 78.111.152.229.

Personal data

  • Date of birth: 10.12.1988

Social networks:

E-mail:

Phone numbers:

Telegram:

Bank card:

Online activity:

Russian Cyber ​​Army and Noname057(16) are aggressive pro-Russian hacking groups that use the Ddosia tool to carry out large-scale cyberattacks. Russian Cyber ​​Army emerged in the wake of Russia’s aggression against Ukraine and has since been actively targeting both government and private organizations that oppose Russia. Their methods include DDoS attacks, website hacking, and the targeted distribution of pro-Russian propaganda.

Noname057(16), the developers of Ddosia, are focused on attacks against government agencies and private companies in Lithuania, Poland, Italy, and other countries that are critical of Russia. The group actively recruits new members via Telegram, promising financial rewards for participating in attacks. They also have close ties to other pro-Russian hacking groups, such as Killnet and XakNet, which allows them to scale up their attacks.

Information was taken from open sources Molfar

Found an error?
If you find an error, take a screenshot and send it to the bot.