Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: US Prosecutors Charge Ukrainian Hacker Over Attacks on Critical Infrastructure
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

US Prosecutors Charge Ukrainian Hacker Over Attacks on Critical Infrastructure

Highlights

  • US charges a Ukrainian hacker with cyberattacks on critical infrastructure.

  • Attacks caused physical disruptions to water supplies and food processing plants.

  • Agencies urge stronger security controls for operational technology devices.

Ethan Moreno
Last updated: 10 December, 2025 - 6:19 pm 6:19 pm
Ethan Moreno 2 hours ago
Share
SHARE

Contents
What Roles Did CARR and NoName057(16) Play in the Attacks?What Impact Did the Cyberattacks Have on Infrastructure?How Are Agencies Responding to Ongoing Cyber Threats?

Concerns about the resilience of essential infrastructure heightened as the U.S. Department of Justice charged Victoria Eduardovna Dubranova, a 33-year-old Ukrainian national, with conducting cyberattacks attributed to two Russian-backed groups, CyberArmyofRussia_Reborn (CARR) and NoName057(16). These incidents targeted water systems, food production plants, and government networks in the United States and allied countries, triggering discussions among security experts and policymakers. The legal proceedings, which saw Dubranova extradited to the U.S., underline increasing global efforts to curb cyber threats linked with geopolitical tensions. Both attacks and responses surrounding this case reflect broader trends in modern digital conflict, including the migration of hacktivism into more overt, destructive realms.

Earlier coverage of cyber sabotage involving critical U.S. systems often concentrated on less sophisticated, non-destructive operations, mostly confined to website defacements or temporary disruptions. Recent developments, however, show a marked escalation in tactics, such as direct interference with industrial controls and supply chains. Compared to previously reported cyber interventions, the involvement of individuals charged in connection with fully operational state-linked groups and increasing use of crowd-sourced tools stand out. Prior reports seldom recorded such extensive collaboration between volunteer “hacktivists” and direct state actors, a dynamic more prominent in the current case highlighted by Dubranova’s indictment.

What Roles Did CARR and NoName057(16) Play in the Attacks?

Prosecutors link Dubranova’s alleged activity to operations that ranged from distributed denial of service attacks to damaging industrial control systems. CARR, originally sustained by Russia’s GRU, maintained a sizable online following and orchestrated attacks that reached beyond digital nuisance, causing physical disruptions such as water spills and food contamination. Meanwhile, NoName057(16) developed its own software called DDoSia, enabling large-scale volunteer-driven attacks and providing rewards in cryptocurrency for top participants.

What Impact Did the Cyberattacks Have on Infrastructure?

Authorities report that CARR’s attacks led to significant consequences. For example, public drinking water systems experienced control system failures resulting in the spillage of large volumes of water, while a Los Angeles meat processing plant faced contamination and operational shutdown. NoName057(16), on the other hand, targeted government agencies, financial institutions, and transportation sectors, especially within NATO countries, often coinciding with key international summits and political events to maximize disruption.

How Are Agencies Responding to Ongoing Cyber Threats?

Multiple U.S. government agencies, including the FBI, CISA, NSA, and EPA, have advised critical infrastructure operators to address common vulnerabilities, particularly by limiting internet exposure of operational technology. Enforcement efforts under Operation Red Circus aim to identify and neutralize state-aligned hacktivist operations.

The FBI’s Brett Leatherman stated, “The FBI doesn’t just track cyber adversaries. We call them out and bring them to justice.”

The CISA’s Chris Butera added,

“The single most important thing people can do to protect themselves is to reduce the number of operational technology devices exposed to the public-facing internet.”

Dubranova faces a range of felony charges, with potential sentences of up to 27 years if convicted on all counts related to damaging U.S. systems and infrastructure. U.S. authorities have announced monetary rewards for information leading to arrests linked with both CARR and NoName057(16), and additional Treasury sanctions have targeted leading figures in these groups. The creation of Z-Pentest by former CARR members underscores the adaptive nature of these threat actors despite law enforcement pressure, maintaining operational continuity and evolving attack strategies. Trials are set for early 2026, reflecting the complexity and scale of ongoing investigations.

Cyberattacks on infrastructure emphasize persistent vulnerabilities in interconnected control systems, which adversaries often exploit with a mix of technical skill and coordinated social manipulation. Reviewing public advisories and responses reveals that many entry points are preventable through better cybersecurity hygiene—especially limiting the exposure of industrial controls online. The ongoing cases broaden the public’s understanding of modern cyber conflict, showing how hacktivism can evolve into organized, state-aligned operations with real-world effects. Organizations managing vital infrastructure should review their security postures against known tactics and consider regular threat intelligence updates. Vigilance and coordinated defense remain vital, particularly as actors continue shifting approaches in response to increased scrutiny from security professionals and law enforcement.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Leaders Push New Steps to Strengthen Cybersecurity Defenses

Coalition Expands Cyber Insurance to Cover Deepfake Attacks

Microsoft Addresses Active Zero-Day in Latest Patch Tuesday Update

U.S. Pursues Iranian Cyber Unit’s Key Figures with $10M Incentive

Ransomware Payments Drop as Major Sectors Face Persistent Threats

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Inbolt Moves Bin Picking Forward with Adaptive Vision-Guided Robots
Next Article LoRa Alliance Surpasses 125 Million LoRaWAN Device Deployments Worldwide

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Targets Waymo With Claims of Driverless Dominance
Electric Vehicle
FDA Clears MMI’s NanoWrist Tools for US Robotic Surgery
Robotics
Tesla and Samsung Speed Up AI5 Chip for Self-Driving Vehicles
Electric Vehicle
LoRa Alliance Surpasses 125 Million LoRaWAN Device Deployments Worldwide
IoT
Inbolt Moves Bin Picking Forward with Adaptive Vision-Guided Robots
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?