On the eve of its municipal and regional elections, Denmark became the target of a coordinated Distributed Denial-of-Service (DDoS) campaign orchestrated by the pro-Russian hacktivist group NoName057(16). The attacks aimed to disrupt access to numerous government, political, and defense-related websites, including the Danish Ministry of Transport and the citizen portal Borger.dk. While the attacks caused only temporary outages and no data was compromised, their timing suggests a clear intent to interfere with the democratic process by creating disruption and spreading uncertainty. This incident is consistent with NoName057(16)'s ongoing strategy of launching nuisance-level attacks against countries perceived as hostile to Russian interests.
NoName057(16) is a politically motivated threat group that emerged following Russia's invasion of Ukraine. Their primary tactic is conducting DDoS attacks against government and critical infrastructure websites in countries that support Ukraine. Their goal is not data theft or financial gain, but disruption, propaganda, and psychological impact.
In this campaign, the group targeted a range of Danish institutions to maximize visibility and disruption around the election period. The list of targets included:
The attacks were successful in temporarily taking some of these websites offline, demonstrating the group's capability to generate sufficient traffic to overwhelm unprotected or under-protected web services. Danish authorities, including the Danish Defence Intelligence Service (FE), had anticipated such attacks and issued warnings, allowing some entities to take preemptive measures.
The core technique used by NoName057(16) is Network Denial of Service, specifically a Distributed Denial of Service (DDoS) attack. The group operates a volunteer-driven botnet, primarily through a tool called 'DDoSia'. Sympathizers and volunteers download the DDoSia client, which then receives commands from the group's C2 servers, directing the participants' computers to flood a specific target website with traffic.
The attack typically manifests as a Layer 7 (application layer) DDoS, where the botnet generates a massive volume of HTTP/S requests designed to exhaust the target web server's resources (CPU, memory, connections). This is often more effective than simple network-layer floods because it mimics legitimate traffic, making it harder to filter.
The group coordinates its attacks and announces its 'successes' on its Telegram channel, using the platform for recruitment, propaganda, and target designation.
Using a cloud-based DDoS mitigation service acts as a specialized network intrusion prevention system to filter out malicious traffic.
Configuring rate limiting and geoblocking on network appliances can help filter a portion of the malicious DDoS traffic.
Mapped D3FEND Techniques:
The most effective countermeasure against DDoS attacks like those from NoName057(16) is to use a specialized, cloud-based Inbound Traffic Filtering service, commonly known as a DDoS mitigation provider or Content Delivery Network (CDN). For the Danish government and political parties, this would mean routing all website traffic through a provider like Akamai, Cloudflare, or AWS Shield. These services have massive global networks capable of absorbing terabits of attack traffic. They use sophisticated techniques to distinguish between human users and malicious bots, filtering out the attack traffic at the edge of their network so that only legitimate requests reach the origin server. This prevents the target's own infrastructure from being overwhelmed, ensuring service availability even during a large-scale attack.
For early detection of a DDoS attack, organizations should implement Inbound Session Volume Analysis. This involves continuously monitoring the volume and rate of incoming network traffic and sessions to their web properties. By establishing a baseline of what constitutes normal traffic levels for different times of day and week, security teams can configure alerts to trigger when traffic volume exceeds a predefined threshold by a significant margin. For the Danish entities, a sudden spike of several hundred percent in HTTP requests would be a clear indicator of an impending DDoS attack. This early warning allows defenders to activate their incident response plan, notify their DDoS mitigation provider, and switch to a higher level of protection before the website becomes completely unavailable.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats