In short
- The DoJ has indicted a Ukrainian lady in reference to the exercise of two pro-Russia cyberattacking teams.
- The 2 teams launched Distributed Denial-of-Service assaults towards infrastructure targets within the U.S. and elsewhere.
- Chainalysis says that arrests and sanctions make it tougher for such teams to function.
The U.S. Division of Justice has issued two indictments towards a Ukrainian particular person accused of being concerned with two Russian state-sanctioned cyberattack teams.
33-year-old Victoria Eduardovna Dubranova, a Ukrainian nationwide who was extradited to america earlier this 12 months, is alleged to have supplied help to the CyberArmyofRussia_Reborn (CARR) and NoName.
Justice Division Declares Actions to Fight Two Russian State-Sponsored Cyber Prison Hacking Teams
Ukrainian Nationwide Indicted and Rewards Introduced for Co-Conspirators Regarding Harmful Cyberattacks Worldwide
“In the present day’s actions show the Division’s dedication… pic.twitter.com/GVuieHxjG6
— Nationwide Safety Division, U.S. Dept of Justice (@DOJNatSec) December 10, 2025
The indictment alleges that each teams dedicated cyberattacks—together with denial-of-service assaults—towards crucial infrastructure and people internationally, with NoName members paid in cryptocurrency.
Each indictments towards Dubranova allege that she dedicated conspiracy to wreck protected computer systems, whereas the indictment in reference to CARR additionally expenses the Ukrainian with one rely of tampering with public water methods, one rely of entry system fraud, and one rely of aggravated id theft.
The DoJ additionally says that the Russian authorities has supplied each CARR and NoName with monetary help, which each teams used to conduct cyberattack campaigns.
In CARR’s case, it used its funding to subscribe to DDoS-as-a-service platforms, whereas NoName developed its personal proprietary distributed denial-of-service software program.
CARR’s exploits embrace concentrating on public consuming water methods throughout a number of American states, attacking a meat processing facility in Los Angeles in November 2024, and concentrating on election infrastructure throughout U.S. elections.
In NoName’s case, it’s accused of taking credit score for a whole lot of cyberattacks towards victims internationally, in help of Russia’s geopolitical curiosity.
The group allegedly revealed particulars of its exploits on Telegram, the place it additionally recruited volunteers, revealed leaderboards of probably the most prolific DDoS attackers, and paid the people in crypto.
Dubranova, who the DoJ claims was concerned closely in each teams, will face trial in relation to NoName expenses on February 3 of subsequent 12 months, whereas her trial in relation to CARR exploits will start April 7.
She faces as much as 27 years in jail if discovered responsible of the CARR-related expenses, and as much as 5 years if convicted of the fees related together with her alleged NoName involvement.
NoName, CARR and crypto
Whereas the DoJ’s indictment gives no additional particulars on how both NoName or CARR made use of cryptocurrencies, such use prolonged past paying volunteers.
“CARR and NoName directed a portion of the cryptocurrency donations to buy infrastructure used for disruptive DDoS assaults,” says Jacqueline Burns-Koven, the Head of Cyber Risk Intelligence at Chainalysis.
Talking to Decrypt, Burns-Koven advised that, regardless of crypto’s well-liked fame for privateness, it will probably operate as a worthwhile law-enforcement instrument in instances reminiscent of these.
“Though they didn’t amass important funds from their donations or DDoS campaigns, and whereas DDoS infrastructure is comparatively low cost, even the smallest hint of cryptocurrency can be utilized to assist determine and disrupt menace actors,” she stated.
The existence of pre-existing sanctions in relation to CARR, in addition to this week’s indictment, will widen the web that serves to limit pro-Russia cyber exercise.
Burns-Koven defined, “With these designations in place, it is going to be tougher for entities to donate to those teams—or for the teams to off-ramp or launder the funds—as a result of transactions could be simply recognized on-chain by way of the usage of blockchain analytics options.”
Whereas new Russia-aligned hacking teams could show an inclination to seem the place older ones have disappeared, Burns-Koven additionally advised that the general public identification and arrest of people does have a deterrent impact, whereas additionally working to “sow mistrust and discord” amongst remaining members.
For instance, she stated, CARR, “allegedly collaborated with a lot of hacktivist teams and their demise is a tangible reminder to teams of the prices of participating in this type of exercise.”
Every day Debrief E-newsletter
Begin each day with the highest information tales proper now, plus unique options, a podcast, movies and extra.

