Legal Proceedings Against Victoria Dubranova
The United States Department of Justice (DoJ) has initiated legal proceedings against Victoria Eduardovna Dubranova, a 33-year-old individual from Ukraine, who is suspected of facilitating operations for two Russian-backed hacking collectives known as CyberArmyofRussia_Reborn (CARR) and NoName. Dubranova was extradited to the U.S. earlier in the year and is facing multiple charges linked to her alleged role in various high-profile cyberattacks targeting essential infrastructure and other entities globally.
Charges and Allegations
The charges against her include conspiracy to damage protected computers, as stated in both indictments. Specifically, the indictment associated with CARR also accuses her of:
- Tampering with public water systems
- Committing access device fraud
- Aggravated identity theft
Reports suggest these cyberattack groups received financial backing from the Russian government, which funded their malicious activities including subscription services for DDoS attacks. CARR reportedly employed its funds to access DDoS-as-a-service platforms while NoName managed to innovate its own DDoS software.
Cyber Operations and Impact
CARR has executed various cyber operations, such as:
- Endangering public drinking water systems across multiple U.S. states
- Assaulting a meat processing facility in Los Angeles in November 2024
- Infiltrating U.S. election infrastructure
Separately, NoName claims to have conducted cyberattacks on a global scale, affirming its operations via public channels such as Telegram where they also advertised for new members and listed the most active attackers, compensating them in cryptocurrency.
Trial Dates and Potential Sentences
Dubranova’s upcoming trial related to NoName is scheduled for February 3, while her case concerning CARR is set to commence on April 7. If convicted of the charges stemming from CARR, she could be sentenced to a maximum of 27 years, with an additional five years possible for her involvement with NoName.
Cryptocurrency and Law Enforcement
Though the DoJ’s indictment does not elaborate on the specifics of cryptocurrency’s utilization by these groups, it has been revealed that both CARR and NoName directed a portion of their donations toward the acquisition of the infrastructure necessary for executing DDoS attacks. Jacqueline Burns-Koven, Head of Cyber Threat Intelligence at Chainalysis, emphasized that while the funds raised from donations and campaigns might not be ample, any trail of cryptocurrency can significantly aid law enforcement in tracking down criminal activities.
Impact of Sanctions and Legal Actions
The existing sanctions against CARR, coupled with this indictment, are expected to intensify restrictions against pro-Russia cyber operations. Burns-Koven noted that these legal actions complicate donations to such groups and obstruct their ability to launder funds, as blockchain analytics can reveal financial transactions.
Conclusion
Despite the potential for new hacking factions to emerge as old ones fade, the apprehension and public exposure of individuals associated with these groups can serve as a deterrent while simultaneously creating mistrust among remaining operatives. For instance, CARR’s past partnerships with hacktivist groups serve as a notable warning regarding the repercussions of involvement in such cyber endeavours.