US extradites member of Russian hacktivist group involved in critical infrastructure attacks

A 33-year-old Ukrainian national was extradited to the U.S. after being indicted on hacking charges related to her involvement in Russian groups that have claimed credit for hundreds of attacks on critical infrastructure.

The Justice Department unveiled two indictments on Tuesday evening charging Victoria Eduardovna Dubranova for her role in CyberArmyofRussia_Reborn (CARR) and NoName057(16) — two prominent Russian hacktivist groups known for launching distributed denial-of-service (DDoS) attacks. The groups, according to court documents, are backed by the Russian government financially and operationally. 

Prosecutors said in addition to DDoS attacks, the groups have also been involved in cyberattacks and intrusions “in support of Russia’s geopolitical interests.”

EPA Acting Assistant Administrator Craig Pritzlaff said Dubranova was allegedly involved in tampering with public water systems that “put communities and the nation’s drinking water resources at risk.”

FBI Cyber Division Assistant Director Brett Leatherman declined to say when Dubranova was extradited or how she was arrested but the Justice Department said in a statement that she was sent to the U.S. earlier this year. 

Dubranova pleaded not guilty in both cases and her trial for NoName057(16) is scheduled for February 3 while the trial for CARR is set for April 7. 

Both groups use the Russian government support to purchase subscriptions to DDoS services and other cybercrime tools. 

The indictment backs previous reporting from Recorded Future News that found NoName057(16) was a state-sanctioned effort bolstered by an October 2018 order from Russian President Vladimir Putin creating the group’s proprietary DDoS program.

For CARR, Dubranova is facing one count of conspiracy to damage protected computers and tamper with public water systems, one count of damaging protected computers, one count of access device fraud and one count of aggravated identity theft. She faces a maximum sentence of 27 years if convicted. 

With the NoName057(16) indictment, Dubranova was charged with one count of conspiracy to damage protected computers and is facing a maximum penalty of five years in prison. 

“Politically motivated hacktivist groups, whether state-sponsored like CARR or state-sanctioned like NoName, pose a serious threat to our national security, particularly when foreign intelligence services use civilians to obfuscate their malicious cyber activity targeting American critical infrastructure as well as attacking proponents of NATO and U.S. interests abroad,” said First Assistant U.S. Attorney Bill Essayli. 

The Treasury Department previously sanctioned two leading CARR members, Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, in July 2024. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Insider Risk Summit West

Next Post

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Related Posts

SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

A proxy network known as REM Proxy is powered by malware known as SystemBC, offering about 80% of the botnet to its users, according to new findings from the Black Lotus Labs team at Lumen Technologies. "REM Proxy is a sizeable network, which also markets a pool of 20,000 Mikrotik routers and a variety of open proxies it finds freely available online," the company said in a report shared with
Read More

Securing the Open Android Ecosystem with Samsung Knox

Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can hold your business back from unlocking its full potential. The truth is, with work happening everywhere, every device connected to your
Read More

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces

The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, 2025. "Since its debut, the group's Telegram channels have been removed and recreated at least 16 times under varying iterations of the original name – a recurring cycle reflecting platform moderation and the operators'
Read More