Pro-Russian group claims hits on Danish party websites as voters head to polls

Cyberattacks claimed by pro-Russian hackers briefly knocked offline Danish political party and government websites on the eve of local elections, officials said, adding that the incidents did not disrupt voting.

Several party websites — including those of the Conservatives, the Red-Green Alliance, the Moderates and the ruling Social Democrats — were hit by distributed denial-of-service (DDoS) attacks on Monday, temporarily preventing access. DDoS attacks flood targeted servers with traffic to disrupt normal operations.

The Russian-aligned hacker group NoName057(16), known for DDoS campaigns, claimed responsibility.

The Danish Agency for Social Security said it was aware of the outages and was monitoring the situation alongside military intelligence. DDoS incidents, it noted, have become “part of the normal picture” in Denmark, with local websites frequently targeted by groups seeking attention rather than strategic gain.

According to election officials, the attacks had no effect on voting, which is conducted entirely by hand. Voters were heading to the polls on Tuesday.

Among the victims was The Copenhagen Post, an English-language outlet whose servers were knocked offline for several hours on Monday. The newsroom said it received advance warning from intelligence services and that no data had been compromised.

In the week leading up to the elections, Danish authorities recorded an uptick in cyber incidents targeting public- and private-sector websites, many of them claimed by pro-Russian groups. Earlier this month, websites belonging to the Danish government and several defence companies were briefly taken offline in a DDoS attack that officials said likely originated in Russia; NoName057(16) also claimed responsibility.

Local authorities said it remained unlikely that hackers would attempt to interfere directly in the electoral process.

Pro-Russian hacking groups have stepped up disruptive activity around elections across Europe. In September, Moldova’s electoral infrastructure suffered multiple cyberattacks, including DDoS incidents that disrupted access to the Central Electoral Commission’s website and government cloud services. In May, Poland and Romania were also targeted in similar campaigns.

NoName057(16), which emerged shortly after Russia’s 2022 invasion of Ukraine, specializes in short-lived DDoS attacks carried out with the help of volunteer participants. Its operations have largely focused on European countries, including Poland, Czechia, Lithuania and Italy.

In July, European and U.S. law enforcement seized more than 100 servers allegedly used by the group and disrupted what authorities described as a key part of its infrastructure. German investigators also issued six arrest warrants for Russian nationals believed to help lead the group. 

Despite the crackdown, NoName057(16) continues to announce new targets daily on its channels on X and Telegram.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

Next Post

National cyber strategy will include focus on ‘shaping adversary behavior,’ White House official says

Related Posts

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces

The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, 2025. "Since its debut, the group's Telegram channels have been removed and recreated at least 16 times under varying iterations of the original name – a recurring cycle reflecting platform moderation and the operators'
Read More