Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
MP3•Episode home
Manage episode 494985342 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency incentives, and Telegram coordination.
In this episode, we unpack:
- Who NoName057(16) is—and how their DDoS-for-crypto campaign operated
- The gamification of cyberwarfare, where young sympathizers earn crypto and badges for attacking government targets
- How Operation Eastwood led to arrests, infrastructure takedowns, and international arrest warrants
- Why DDoS remains a go-to weapon for hacktivists and state-aligned cyber actors
- The role of crypto on both sides of the Russia-Ukraine cyber conflict, from donations to evasion to digital mercenaries
- Why hacktivist groups are blurring the lines between ideology and cybercrime, and how they're increasingly operating like decentralized ransomware gangs
We also explore the long-term implications:
- Can law enforcement really stop these groups?
- What happens when attackers are shielded by national borders or political alignment?
- And how should defenders prepare for digitally mobilized ideological threats with state-level reach?
This is cyberwar by proxy—crowdsourced, monetized, and harder than ever to pin down.
225 episodes