US extradites member of Russian hacktivist group involved in critical infrastructure attacks

A 33-year-old Ukrainian national was extradited to the U.S. after being indicted on hacking charges related to her involvement in Russian groups that have claimed credit for hundreds of attacks on critical infrastructure.

The Justice Department unveiled two indictments on Tuesday evening charging Victoria Eduardovna Dubranova for her role in CyberArmyofRussia_Reborn (CARR) and NoName057(16) — two prominent Russian hacktivist groups known for launching distributed denial-of-service (DDoS) attacks. The groups, according to court documents, are backed by the Russian government financially and operationally. 

Prosecutors said in addition to DDoS attacks, the groups have also been involved in cyberattacks and intrusions “in support of Russia’s geopolitical interests.”

EPA Acting Assistant Administrator Craig Pritzlaff said Dubranova was allegedly involved in tampering with public water systems that “put communities and the nation’s drinking water resources at risk.”

FBI Cyber Division Assistant Director Brett Leatherman declined to say when Dubranova was extradited or how she was arrested but the Justice Department said in a statement that she was sent to the U.S. earlier this year. 

Dubranova pleaded not guilty in both cases and her trial for NoName057(16) is scheduled for February 3 while the trial for CARR is set for April 7. 

Both groups use the Russian government support to purchase subscriptions to DDoS services and other cybercrime tools. 

The indictment backs previous reporting from Recorded Future News that found NoName057(16) was a state-sanctioned effort bolstered by an October 2018 order from Russian President Vladimir Putin creating the group’s proprietary DDoS program.

For CARR, Dubranova is facing one count of conspiracy to damage protected computers and tamper with public water systems, one count of damaging protected computers, one count of access device fraud and one count of aggravated identity theft. She faces a maximum sentence of 27 years if convicted. 

With the NoName057(16) indictment, Dubranova was charged with one count of conspiracy to damage protected computers and is facing a maximum penalty of five years in prison. 

“Politically motivated hacktivist groups, whether state-sponsored like CARR or state-sanctioned like NoName, pose a serious threat to our national security, particularly when foreign intelligence services use civilians to obfuscate their malicious cyber activity targeting American critical infrastructure as well as attacking proponents of NATO and U.S. interests abroad,” said First Assistant U.S. Attorney Bill Essayli. 

The Treasury Department previously sanctioned two leading CARR members, Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, in July 2024. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Insider Risk Summit West

Next Post

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Related Posts

Identity Security: Your First and Last Line of Defense

The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in logic or access can turn flawless automation into a flawless catastrophe. This isn't some dystopian fantasy—it's Tuesday at the office now. We've entered a new phase where autonomous AI agents act with serious system privileges. They
Read More

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date. 1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure. 14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns. LockBit’s reappearance with
Read More

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing
Read More