Pro-Russian group Noname057 claims cyberattack on La Poste services
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内,而且不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。好的,我先看看文章讲了什么。 文章主要讲的是一个亲俄的黑客组织Noname057声称对法国邮政La Poste的网络攻击负责。这次攻击导致La Poste的数字银行和在线服务中断,影响了数百万用户。法国检方介入调查,并提到之前Operation Eastwood行动已经打击过这个组织,逮捕了一些成员,并警告了支持者。 我需要把这些关键点浓缩到100字以内。首先,组织名称和攻击对象:Noname057攻击La Poste。然后影响:数字服务中断,数百万用户受影响。接着是法国检方调查和之前的Operation Eastwood行动的结果。最后提到支持者被警告。 现在组合一下:亲俄黑客组织Noname057声称对法国邮政La Poste的网络攻击负责,导致其数字服务中断影响数百万用户。法国检方介入调查,并提到该组织在Operation Eastwood行动中被打击,逮捕了部分成员并警告支持者。 这样应该在100字左右了。 </think> 亲俄黑客组织Noname057声称对法国邮政La Poste的网络攻击负责,导致其数字服务中断影响数百万用户。法国检方介入调查,并提到该组织在Operation Eastwood行动中被打击,逮捕了部分成员并警告支持者。 2025-12-26 17:18:28 Author: securityaffairs.com(查看原文) 阅读量:1 收藏

Pro-Russian group Noname057 claims cyberattack on La Poste services

Pierluigi Paganini December 26, 2025

Pro-Russian hacking group Noname057 claimed responsibility for the cyberattack that recently disrupted La Poste’s digital banking and online services.

This week, the French national postal service La Poste confirmed a major cyber incident had knocked its information systems offline, disrupting digital banking and online services for millions of customers.

On social media, La Poste said the disruption temporarily rendered several platforms inaccessible, including its main website, mobile app, digital identity service, and the Digiposte document storage platform.

Some post office locations experienced service disruptions, though officials said customers could still conduct banking and postal transactions at service counters. The company confirmed that its online services: La Banque Postale online and the mobile app, laposte.fr, Digiposte, La Poste Digital Identity, and the La Poste application are temporarily inaccessible.

Some post offices may see temporary service disruptions, but counter services remain available as teams work to restore normal operations quickly. Banking customers can still make online payments with SMS authentication, withdraw cash, pay by card in stores, and use WERO transfers.

The pro-Russian hacking group, Noname057, claimed responsibility for a cyberattack the France’s national postal service days before Christmas. French prosecutors said the French intelligence agency DGSI took over the investigation.

La Poste confirmed a DDoS attack knocked core systems offline, causing service disruptions.

In July, European and U.S. authorities disrupted the activities of the pro-Russian hacktivist group NoName057(16) in Operation Eastwood.

Operation Eastwood disrupted NoName057(16)’s infrastructure, taking down over 100 systems and key central servers. Authorities issued seven arrest warrants, including six targeting Russian nationals, two of whom are accused as the main instigators. Suspects are internationally wanted, with five listed on the EU Most Wanted site. Hundreds of group supporters were warned about their legal liability for aiding the group’s DDoS attacks, often driven by pro-Russian ideology.

Operation Eastwood struck a major blow to the pro-Russian hacker group NoName057(16). Authorities carried out two arrests, one in France and another in Spain, and issued seven arrest warrants, six by Germany and one by Spain. Law enforcement conducted 24 house searches across multiple countries, including Czechia, France, Germany, Italy, Spain, and Poland. Thirteen individuals were questioned, and over 1,000 supporters, 15 of them administrators, were notified via messaging apps about their legal responsibility.

The pro-Russian hacker group NoName057(16) has ramped up DDoS attacks against countries supporting Ukraine, many of them NATO members. Since 2023, they’ve targeted Swedish government and banking sites, hit over 250 German entities in 14 attack waves, and disrupted events in Switzerland, including the Ukraine Peace Summit. Dutch authorities also linked them to an attack during the recent NATO summit. Thankfully, all incidents were mitigated without major disruptions.

The pro-Russian hacker group has over 4,000 supporters and employed a self-built botnet composed of hundreds of servers. The group spreads propaganda and recruits through social media, forums, and niche chat apps. Using platforms like DDoSia, they lower technical barriers.

Pro-Russia hacktivist groups like CARR, Z-Pentest, and NoName057(16) exploit poorly secured VNC connections to access OT devices in critical infrastructure, causing varying impacts, including physical damage, primarily targeting water, food, agriculture, and energy sectors. Their attacks are less sophisticated and lower-impact compared to APT groups.

“This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centre’s (EC3) Operation Eastwood
, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental Protection Agency (EPA), and EC3 shared information about cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the United States and globally.” reads a joint advisory from FBI, CISA, National Security Agency (NSA), and partners countries.

CARR attacked U.S. water systems and a Los Angeles meat facility, causing spills, leaks, and damage. GRU guidance financed attacks, targeting critical infrastructure and election sites. A GRU-linked officer, using the handle “Cyber_1ce_Killer,” directed CARR targets, funded DDoS-for-hire services, and is identified as a CARR member.

The U.S. State Department offers up to $2 million for information on CARR members and up to $10 million for details on individuals linked to NoName.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, La Poste)




文章来源: https://securityaffairs.com/186157/hacktivism/pro-russian-group-noname057-claims-cyberattack-on-la-poste-services.html
如有侵权请联系:admin#unsafe.sh