A chilling network of cyberattacks targeting critical U.S. infrastructure has been exposed, with a Ukrainian woman now facing decades in prison for her alleged role. Victoria Eduardovna Dubranova, 33, known by aliases like Vika and SovaSonya, was recently arraigned on charges linking her to Russian-backed hacking groups.
The Department of Justice alleges Dubranova aided two distinct operations: CyberArmyofRussia_Reborn (CARR) and NoName057(16). Both groups are accused of acting in concert with Russian geopolitical objectives, blurring the lines between criminal activity and state-sponsored aggression.
CARR, prosecutors claim, wasn’t a rogue entity but a creation of Russia’s military intelligence agency, the GRU. This group cultivated a significant online presence with a Telegram channel boasting over 75,000 followers, using it to coordinate disruptive attacks.
These weren’t harmless digital pranks. The attacks orchestrated by CARR and NoName057(16) caused tangible damage, impacting essential services. One incident involved a breach of a public water system, resulting in the loss of hundreds of thousands of gallons of potable water.
The consequences extended to the food supply chain, with a November 2024 attack on a Los Angeles meat processing plant leading to the spoilage of thousands of pounds of product and a dangerous ammonia release. These actions demonstrate a deliberate attempt to destabilize American systems.
NoName057(16) proved remarkably prolific, claiming responsibility for over 1,500 attacks spanning from March 2022 to June 2025. Their targets weren’t limited to the U.S., extending to government agencies and critical infrastructure across multiple European nations.
The group even took credit for cyberattacks against Dutch infrastructure surrounding the 2025 NATO Summit in The Hague, signaling a willingness to interfere with international events. Officials describe their tactics as “opportunistic” and focused on creating widespread disruption.
The Department of Justice is now offering a substantial reward – up to $10 million – through the Rewards for Justice program for information leading to the identification of other individuals connected to NoName057(16). The message is clear: anonymity will not protect those involved.
Dubranova faces a potential sentence of up to five years for her involvement in the NoName case and a staggering 27 years for her alleged work with CARR. Trials are scheduled for February and April 2026, promising a deeper dive into the intricacies of these cyber operations.
This case underscores the escalating threat of state-sponsored cyberattacks and the critical need to defend essential infrastructure. The DOJ’s commitment to holding accountable those who seek to undermine American security has never been more apparent.