Hacker linked to Russian-backed CARR and Noname(16) groups charged in the US

 

Hacker linked to Russian-backed CARR and Noname(16) groups charged in the US

The US Justice Department has announced two federal indictments against Ukrainian national Victoria Eduardovna Dubranova, 33, accusing her of helping Russian-backed hackers carry out damaging cyberattacks on critical infrastructure in the United States and around the world.

Dubranova, aka “Vika,” “Tory,” and “SovaSonya,” was extradited to the United States earlier this year. She pleaded not guilty to all charges. Her trial in the NoName case is set for February 3, 2026, and her trial in the CARR case is scheduled for April 7, 2026.

Prosecutors say Dubranova worked with two groups supported by the Russian government: CyberArmyofRussia_Reborn (CARR) and NoName057(16) (NoName). Both groups allegedly received financial support from Russian authorities, including the GRU, Russia’s military intelligence agency. That funding was used to buy cybercriminal tools and services, including subscriptions to DDoS-for-hire platforms.

According to the indictments, CARR was founded and directed by the GRU and regularly boasted on Telegram about its attacks. The group targeted industrial control systems and launched large-scale DDoS attacks. US officials say CARR was responsible for damaging public drinking water systems in several states, causing hundreds of thousands of gallons of water to spill. The group also attacked a meat processing facility in Los Angeles in November 2024, spoiling large quantities of meat and causing an ammonia leak. CARR has also targeted US election infrastructure and websites connected to nuclear regulatory agencies.

Investigators believe at least one GRU officer, using the name “Cyber_1ce_Killer,” directed CARR leaders on which victims to attack and helped finance the group’s access to hacking tools. At its height, CARR had more than 100 members and over 75,000 followers on Telegram, officials said.

The indictment connected to CARR charges Dubranova with conspiracy to damage protected computers and tamper with public water systems, damaging protected computers, access device fraud, and aggravated identity theft. If convicted, she could face up to 27 years in federal prison.

The second case focuses on Dubranova’s alleged support for NoName, a covert cyber operation involving employees of a Russian government-created IT organization called CISM. Prosecutors say NoName carried out hundreds of DDoS attacks around the world using a tool called DDoSia, which relied on network infrastructure built by CISM staff. The group targeted government agencies, banks, railways, and ports. Volunteers from around the world were encouraged to download DDoSia and take part in attacks, and NoName rewarded high-performing participants with cryptocurrency. In the NoName case, Dubranova is charged with conspiracy to damage protected computers, a charge that carries a maximum penalty of five years in prison.

The US Department of State has also announced rewards of up to $2 million for information on individuals linked to CARR and up to $10 million for information on those connected to NoName. Multiple US agencies also issued a joint advisory warning that pro-Russia hacking groups like CARR and NoName are increasingly targeting poorly secured remote access systems used in critical infrastructure.

The US Treasury previously sanctioned two CARR members, Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, in July 2024 for carrying out cyber operations against American infrastructure.


Back to the list