Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime

Danish Banks Are Targets of Pro-Russian DDoS Hacking Group

Nuisance Hacking Group NoName057(16) Takes Credit
Danish Banks Are Targets of Pro-Russian DDoS Hacking Group
A Sydbank branch in Odense, Denmark (Image: Johan Wessman/CC BY 3.0)

Hacking group NoName057(16) targeted multiple Danish banks in a distributed denial-of-service attack Tuesday causing operational delays in many of the affected banks.

See Also: Webinar | Everything You Can Do to Fight Social Engineering and Phishing

Apparent targets included some of the largest financial institutions, including Jyske Bank and Sydbank. Arbejdernes Landsbank said its online banking system was affected.

NoName057(16) on its Telegram channel claimed attacks on Sydbank, Sparekassen Sjælland-Fyn, Bankinvest, Jyskebank.

Reuters reported hackers also hit Bankdata, a private company that provides financial technology. The hackers also targeted Denmark's National Bank, which regained its access after the attack took its website down for a brief period, Reuters reported.

NoName057(16), along with KillNet, is among a handful of cybercrime groups launching DDoS attacks in putative support of the Russian government as it continues its invasion of Ukraine.

NoName057(16) coordinates with a number of subgroups to carry out attacks on its targets. One among these groups is DDosia through which NoName provides instructions on how to use a custom tool available on GitHub under the same name. In September 2022, NoName057(16) established a financial reward for top-ranked members who successfully conduct DDoS attacks.

About the Author

Akshaya Asokan

Akshaya Asokan

Senior Correspondent, ISMG

Asokan is a U.K.-based senior correspondent for Information Security Media Group's global news desk. She previously worked with IDG and other publications, reporting on developments in technology, minority rights and education.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.