Pro-Russia Hacktivist Support: Ukrainian Faces US Charges
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是乌克兰女子Victoria Dubranova被美国指控支持亲俄黑客组织CARR和NoName057(16),参与全球网络攻击。她被引渡到美国,面临27年监禁。CARR与俄罗斯军方有关,攻击关键基础设施,如水、食品和能源部门。文章还提到美国悬赏200万美元寻找CARR成员的信息。 接下来,我需要将这些信息浓缩成100字以内的总结。要包括人物、指控、组织、影响和悬赏。确保语言简洁明了,不使用开头的固定句式。 可能会这样组织:乌克兰女子被指控支持亲俄黑客组织参与全球网络攻击,涉及关键基础设施如水、食品和能源部门。她面临长期监禁,美国悬赏200万美元寻找相关信息。 检查一下是否超过字数限制,并确保所有关键点都涵盖在内。 </think> 乌克兰女子Victoria Dubranova被指控支持亲俄黑客组织CARR和NoName057(16),参与全球网络攻击。她被引渡至美国,面临27年监禁。CARR与俄罗斯军方有关,攻击关键基础设施如水、食品和能源部门。美国悬赏200万美元寻找相关信息。 2025-12-11 08:29:54 Author: securityaffairs.com(查看原文) 阅读量:9 收藏

Pro-Russia Hacktivist Support: Ukrainian Faces US Charges

Pierluigi Paganini December 11, 2025

Ukrainian Victoria Dubranova, 33, faces US charges for aiding pro-Russia hacktivist groups CARR and NoName057(16) in global cyberattacks.

A Ukrainian woman, Victoria Dubranova (33), has been charged in the US for allegedly aiding the pro-Russia hacktivist groups Cyber Army of Russia Reborn (CARR) and NoName057(16) in cyberattacks against critical infrastructure worldwide.

Dubranova was extradited to the US and faces up to 27 years for involvement with CARR and five years for ties to NoName hacktivist groups. She has pleaded not guilty in both cases. CARR, a pro-Russia hacktivist group linked to Russia’s GRU, targets critical infrastructure in the US, Ukraine, and NATO allies. Posing as a patriotic volunteer collective, it began with DDoS attacks and website defacements, later moving to industrial control and SCADA system breaches using scanning and password-guessing, sometimes causing real-world disruptions in water and food facilities.

Pro-Russia hacktivist groups like CARR, Z-Pentest, and NoName057(16) exploit poorly secured VNC connections to access OT devices in critical infrastructure, causing varying impacts, including physical damage, primarily targeting water, food, agriculture, and energy sectors. Their attacks are less sophisticated and lower-impact compared to APT groups.

“This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centre’s (EC3) Operation Eastwood
, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental Protection Agency (EPA), and EC3 shared information about cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the United States and globally.” reads a joint advisory from FBI, CISA, National Security Agency (NSA), and partners countries.

CARR attacked U.S. water systems and a Los Angeles meat facility, causing spills, leaks, and damage. GRU guidance financed attacks, targeting critical infrastructure and election sites. A GRU-linked officer, using the handle “Cyber_1ce_Killer,” directed CARR targets, funded DDoS-for-hire services, and is identified as a CARR member.

The U.S. State Department offers up to $2 million for information on CARR members and up to $10 million for details on individuals linked to NoName.

“Under this reward offer, RFJ is offering up to $2 million for information on individuals associated with Cyber Army of Russia Reborn (CARR), also known as Z-Pentest. According to industry reporting, the group is linked to the Main Centre for Special Technologies (GTsST) within the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). CARR members have also publicly claimed their connections to the Russian government.” reads the announcement. “In late 2023, CARR began claiming responsibility for accessing industrial control systems of multiple U.S. and European critical infrastructure targets. Using various techniques, CARR has manipulated unsecured industrial control systems at water supply, hydroelectric, wastewater, and energy facilities in the U.S. and Europe.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, pro-Russia hacktivist groups)




文章来源: https://securityaffairs.com/185552/hacktivism/pro-russia-hacktivist-support-ukrainian-faces-us-charges.html
如有侵权请联系:admin#unsafe.sh