Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Pro-Russian Hacktivists Launch Sustained Cyber Campaign
Pro-Russian Hacktivists Launch Sustained Cyber Campaign
NEWS

Pro-Russian Hacktivists Launch Sustained Cyber Campaign

NoName057(16) and allied hacktivist groups are conducting DDoS attacks against Milan-Cortina 2026 Olympic infrastructure, Italian government sites, and...

Dylan H.

News Desk

February 20, 2026
4 min read

Olympic Cyber Warfare

Since the 2026 Winter Olympics opened in Milan and Cortina d'Ampezzo on February 6, cybersecurity researchers have tracked a sustained campaign of pro-Russian hacktivist activity targeting Olympic infrastructure, Italian government websites, and diplomatic missions abroad. The dominant group, NoName057(16), has claimed responsibility for attacks against roughly 120 targets.

Italy's cybersecurity agency thwarted the attacks before they caused significant operational disruption, but the campaign highlights the reality that major international sporting events are now permanent targets for geopolitically motivated cyber operations.


Campaign Overview

AttributeDetail
Primary Threat ActorNoName057(16)
Attack TypeDistributed Denial of Service (DDoS)
Targets~120 including Olympic venues, Italian consulates, hotels, government sites
MotivationRetaliation for Italy's support of Ukraine
DurationOngoing since February 6, 2026
ImpactLimited — most attacks mitigated before causing disruption

Who Is NoName057(16)

NoName057(16) is the most prolific pro-Russian hacktivist group operating today. Key facts:

  • Active since March 2022, shortly after Russia's invasion of Ukraine
  • Operates the DDoSia crowdsourced attack platform, recruiting volunteers to amplify DDoS capacity
  • Primarily targets NATO member states and countries supporting Ukraine
  • Claims operations on Telegram with propaganda messaging
  • Has previously targeted government websites in Poland, Czech Republic, Lithuania, France, and now Italy

Target Breakdown

Olympic-Related

  • Facilities connected to the 2026 Winter Games venues
  • Hotels in Cortina d'Ampezzo housing athletes and officials
  • Transportation infrastructure serving Olympic sites

Diplomatic Missions

  • Italian consulates in Sydney, Toronto, and Paris
  • Government websites of Italian ministries

Propaganda Messaging

NoName057(16)'s Telegram claims describe the campaign as retaliation for:

  • Italy's ongoing military and financial support for Ukraine
  • The economic cost of hosting the Olympics
  • Italy's alignment with NATO cyber defense initiatives

The Russia Exclusion Factor

A critical context for this campaign: Russia is excluded from medal competition at the 2026 Winter Games. This changes the strategic calculus:

  • No reputational risk — With no Russian team competing, there is no disincentive from potentially disrupting the Games
  • Propaganda opportunity — Disrupting Western events aligns with Russia's information warfare objectives
  • Plausible deniability — Hacktivist groups provide a layer of separation from state-sponsored operations

Palo Alto's Unit 42 researchers note that Russia's exclusion "reduces the traditional deterrents tied to reputational or competitive consequences" that have historically constrained Olympic cyber operations.


Comparison to Previous Olympic Campaigns

OlympicsThreat ActorAttackImpact
2018 PyeongchangRussia (GRU)Olympic Destroyer wiper malwareDisrupted opening ceremony IT systems
2021 TokyoMultiple state actors450M attempted attacksLargely mitigated
2022 BeijingMultipleSurveillance concerns, phishingAthletes warned to use burner phones
2024 ParisPro-Russian hacktivistsDDoS, disinformationLimited operational impact
2026 Milan-CortinaNoName057(16)Sustained DDoS campaign~120 targets, limited disruption

Italy's Defensive Response

Italy's National Cybersecurity Agency (ACN) and partnering security organizations have successfully mitigated most attacks:

  • DDoS mitigation infrastructure absorbed attack traffic
  • Real-time monitoring enabled rapid response to new targets
  • International intelligence sharing provided early warning of planned attacks
  • No significant service disruptions reported at Olympic venues

What to Expect

The campaign is expected to continue through the closing ceremony on February 22. Security researchers warn of potential escalation tactics:

  1. Combined operations — DDoS as distraction while attempting deeper intrusions
  2. Supply chain targeting — Attacking vendors and service providers to Olympic organizers
  3. Disinformation amplification — Using social media to exaggerate the impact of attacks
  4. Post-Games targeting — Shifting to Italian government and infrastructure targets after the Olympics end

Key Takeaways

  1. 120+ targets hit by pro-Russian hacktivists since the Games opened
  2. NoName057(16) is the primary actor, motivated by Italy's support for Ukraine
  3. Russia's exclusion from competition removes traditional deterrents against cyber disruption
  4. Italy's defenses have held — most attacks were mitigated before causing disruption
  5. Every major international event is now a cyber target — Olympic cybersecurity is a permanent requirement

Sources

  • Palo Alto Unit 42 — Understanding the Russian Cyberthreat to the 2026 Winter Olympics
  • The Record — Italy Blames Russia-Linked Hackers for Cyberattacks Ahead of Winter Olympics
  • Intel 471 — Winter Olympics 2026: Hacktivism Surges Ahead of Protests and Suspected Sabotage
  • Bitdefender — Milano Cortina 2026 Cyberattacks: Italy Blames Russia
#Winter Olympics#Russia#Hacktivism#DDoS#NoName057#Italy#Geopolitics

Related Articles

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom Windows ransomware strain called GenieLocker in targeted operations.

4 min read

Iran-Linked Hackers Breach FBI Director's Personal Email, Hit Stryker With Wiper Attack

Iran's Handala Hack Team breached the personal email of FBI Director Kash Patel, leaking photos and documents online, while simultaneously launching a destructive wiper attack against medical device maker Stryker Corporation.

4 min read

Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies with Custom Ransomware

The pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian businesses in the past year and is escalating operations...

4 min read
Back to all News