Uncategorized

Ukrainian woman charged over Russian-backed cyberattacks; $10M reward offered for others

Victoria Eduardovna Dubranova faces up to 32 years for allegedly helping Russian-backed cyber groups in attacks on critical infrastructure.

The Department of Justice (DOJ) has charged a Ukrainian woman with helping to carry out dozens of cyberattacks on critical U.S. infrastructure, working with Russian-backed hackers, according to newly unsealed indictments.

The State Department’s Rewards for Justice program is also offering up to $10 million for information leading to others tied to one of the pro-Russia hacking groups she was allegedly affiliated with.

Victoria Eduardovna Dubranova, 33, was arraigned Tuesday on a second federal indictment after being extradited to the U.S. earlier this year.


Dubranova, also known as Vika, Tory, and SovaSonya, pleaded not guilty to charges related to her alleged work with two Russian-backed operations, CyberArmyofRussia_Reborn (CARR) and NoName057(16).

RUSSIAN HACKERS USE FAKE CAPTCHA TESTS TO SPREAD NEW MALWARE FAMILIES ACROSS MULTIPLE TARGETS

Prosecutors say both groups receive backing from Russian government bodies to push Russian geopolitical interests.

According to the DOJ, CARR was founded and funded by Russia’s military intelligence agency, the GRU, and operated a popular Telegram channel with more than 75,000 followers.

Officials allege the group’s attacks caused real-world harm, including damage to public water systems that spilled hundreds of thousands of gallons of drinking water.

They also cited a November 2024 breach at a Los Angeles meat processing facility that spoiled thousands of pounds of product and released ammonia.

RUSSIAN HACKERS USE FAKE CAPTCHA TESTS TO SPREAD NEW MALWARE FAMILIES ACROSS MULTIPLE TARGETS

See also  Walz urges Noem to 'reassess' immigration enforcement strategy in Minnesota after alleged citizen arrests

Today’s actions demonstrate the Department’s commitment to disrupting malicious Russian cyber activity – whether conducted directly by state actors or their criminal proxies – aimed at furthering Russia’s geopolitical interests,” said Assistant Attorney General for National Security John A. Eisenberg. “We remain steadfast in defending essential services, including food and water systems Americans rely on each day, and holding accountable those who seek to undermine them.”

NoName057(16), meanwhile, is described as a Russia-linked hacktivist group responsible for more than 1,500 attacks between March 2022 and June 2025.

Its targets included government agencies, telecommunications firms, military, financial institutions, and transportation authorities, also across Ukraine, Estonia, Finland, Lithuania, Norway, Poland, and Sweden.

FORMER SECURITY GUARD AT US EMBASSY OVERSEAS IS CONVICTED OF SPYING FOR RUSSIA AND IRAN

The group also claimed responsibility for cyberattacks on Dutch infrastructure ahead of and during the 2025 NATO Summit in The Hague.

These groups “are actively engaging in opportunistic, low-sophistication malicious cyber activity to gain notoriety and create mayhem,” said Chris Butera, CISA’s acting deputy executive assistant director for cybersecurity.

Dubranova faces up to five years in the NoName case and as many as 27 years in the CARR matter. Trials are set for February and April 2026.

Meanwhile, Rewards for Justice announced its $10 million reward with a pointed message aimed at other NoName participants: “They call themselves ‘NoName.’ But maybe YOU can name some names.” it read.

See also  FBI’s renewed push in DC pipe bomb case shows how fresh eyes can change a stalled investigation

Fox News Digital has reached out to the DOJ for further comment.

Share this article:
Share on Facebook
Facebook
Tweet about this on Twitter
Twitter