Pro-Russian group claims hits on Danish party websites as voters head to polls

Cyberattacks claimed by pro-Russian hackers briefly knocked offline Danish political party and government websites on the eve of local elections, officials said, adding that the incidents did not disrupt voting.

Several party websites — including those of the Conservatives, the Red-Green Alliance, the Moderates and the ruling Social Democrats — were hit by distributed denial-of-service (DDoS) attacks on Monday, temporarily preventing access. DDoS attacks flood targeted servers with traffic to disrupt normal operations.

The Russian-aligned hacker group NoName057(16), known for DDoS campaigns, claimed responsibility.

The Danish Agency for Social Security said it was aware of the outages and was monitoring the situation alongside military intelligence. DDoS incidents, it noted, have become “part of the normal picture” in Denmark, with local websites frequently targeted by groups seeking attention rather than strategic gain.

According to election officials, the attacks had no effect on voting, which is conducted entirely by hand. Voters were heading to the polls on Tuesday.

Among the victims was The Copenhagen Post, an English-language outlet whose servers were knocked offline for several hours on Monday. The newsroom said it received advance warning from intelligence services and that no data had been compromised.

In the week leading up to the elections, Danish authorities recorded an uptick in cyber incidents targeting public- and private-sector websites, many of them claimed by pro-Russian groups. Earlier this month, websites belonging to the Danish government and several defence companies were briefly taken offline in a DDoS attack that officials said likely originated in Russia; NoName057(16) also claimed responsibility.

Local authorities said it remained unlikely that hackers would attempt to interfere directly in the electoral process.

Pro-Russian hacking groups have stepped up disruptive activity around elections across Europe. In September, Moldova’s electoral infrastructure suffered multiple cyberattacks, including DDoS incidents that disrupted access to the Central Electoral Commission’s website and government cloud services. In May, Poland and Romania were also targeted in similar campaigns.

NoName057(16), which emerged shortly after Russia’s 2022 invasion of Ukraine, specializes in short-lived DDoS attacks carried out with the help of volunteer participants. Its operations have largely focused on European countries, including Poland, Czechia, Lithuania and Italy.

In July, European and U.S. law enforcement seized more than 100 servers allegedly used by the group and disrupted what authorities described as a key part of its infrastructure. German investigators also issued six arrest warrants for Russian nationals believed to help lead the group. 

Despite the crackdown, NoName057(16) continues to announce new targets daily on its channels on X and Telegram.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

Next Post

National cyber strategy will include focus on ‘shaping adversary behavior,’ White House official says

Related Posts

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp a worm that deploys a banking trojan in attacks targeting users in Brazil. The latest wave is characterized by the attackers shifting from PowerShell to a Python-based variant that spreads the
Read More

⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently exploiting critical flaws in the daily software we all rely on—and in some cases, they started attacking before a fix was even ready. Below, we list the urgent updates you need to install right now to stop these active threats. ⚡ Threat of the Week Apple and
Read More

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It's rooted in Array's DesktopDirect, a remote desktop access solution that allows users to securely access
Read More