Pro-Russian Hackers Target Denmark with DDoS Attacks Ahead of Elections

Pro-Russian Group NoName057(16) Launches DDoS Attacks on Danish Government and Political Parties Before Elections

MEDIUM
November 17, 2025
4m read
CyberattackThreat Actor

Related Entities

Threat Actors

Organizations

Danish Ministry of TransportDanish Defence Intelligence Service (FE)

Products & Tech

Borger.dk

Other

TermaThe Copenhagen Post

MITRE ATT&CK Techniques

Full Report

Executive Summary

On the eve of its municipal and regional elections, Denmark became the target of a coordinated Distributed Denial-of-Service (DDoS) campaign orchestrated by the pro-Russian hacktivist group NoName057(16). The attacks aimed to disrupt access to numerous government, political, and defense-related websites, including the Danish Ministry of Transport and the citizen portal Borger.dk. While the attacks caused only temporary outages and no data was compromised, their timing suggests a clear intent to interfere with the democratic process by creating disruption and spreading uncertainty. This incident is consistent with NoName057(16)'s ongoing strategy of launching nuisance-level attacks against countries perceived as hostile to Russian interests.


Threat Overview

NoName057(16) is a politically motivated threat group that emerged following Russia's invasion of Ukraine. Their primary tactic is conducting DDoS attacks against government and critical infrastructure websites in countries that support Ukraine. Their goal is not data theft or financial gain, but disruption, propaganda, and psychological impact.

In this campaign, the group targeted a range of Danish institutions to maximize visibility and disruption around the election period. The list of targets included:

  • Government: Danish Ministry of Transport, Borger.dk (national citizen portal).
  • Political Parties: The Conservatives, the Red-Green Alliance.
  • Defense: Terma (a Danish defense and aerospace company).
  • Media: The Copenhagen Post (an English-language newspaper).

The attacks were successful in temporarily taking some of these websites offline, demonstrating the group's capability to generate sufficient traffic to overwhelm unprotected or under-protected web services. Danish authorities, including the Danish Defence Intelligence Service (FE), had anticipated such attacks and issued warnings, allowing some entities to take preemptive measures.

Technical Analysis

The core technique used by NoName057(16) is Network Denial of Service, specifically a Distributed Denial of Service (DDoS) attack. The group operates a volunteer-driven botnet, primarily through a tool called 'DDoSia'. Sympathizers and volunteers download the DDoSia client, which then receives commands from the group's C2 servers, directing the participants' computers to flood a specific target website with traffic.

The attack typically manifests as a Layer 7 (application layer) DDoS, where the botnet generates a massive volume of HTTP/S requests designed to exhaust the target web server's resources (CPU, memory, connections). This is often more effective than simple network-layer floods because it mimics legitimate traffic, making it harder to filter.

The group coordinates its attacks and announces its 'successes' on its Telegram channel, using the platform for recruitment, propaganda, and target designation.

Impact Assessment

  • Service Disruption: The primary impact was the temporary unavailability of several public-facing websites. While disruptive, the outages were brief and did not impact the core functioning of the election process or government services.
  • Informational and Psychological Impact: The main goal of such attacks is to create noise, sow discord, and project an image of power. By attacking on the eve of an election, the group aimed to undermine public confidence in the stability of the country's digital infrastructure.
  • Resource Drain: Responding to these attacks forces security teams and service providers to divert resources to mitigation efforts, even if the attacks themselves are not technically sophisticated.

Cyber Observables for Detection

  • Network Traffic Pattern: A massive, sudden spike in inbound web traffic from a geographically diverse set of IP addresses, often from residential ISPs or cloud providers.
  • Log Source: Web server logs (e.g., Apache, Nginx, IIS) showing an enormous number of HTTP GET or POST requests for the same page or a small set of pages.
  • User Agent: Attack traffic may use a limited set of user-agent strings associated with the DDoS tool being used.
  • IP Address: While IPs are distributed, they may share characteristics, such as originating from countries known for botnet activity.

Detection & Response

  • Traffic Volume Monitoring: The most obvious sign of a DDoS attack is a dramatic and sustained increase in traffic volume. Network monitoring tools should be configured to alert on such anomalies. This is a form of D3-ISVA: Inbound Session Volume Analysis.
  • Error Rate Monitoring: Monitor web server and application error rates. A sharp increase in HTTP 5xx server errors can indicate that the server is overloaded and unable to handle the request volume.
  • DDoS Mitigation Service: The most effective response is to route traffic through a cloud-based DDoS mitigation provider (e.g., Cloudflare, Akamai, AWS Shield). These services have the scale and technology to absorb and filter out malicious traffic before it reaches the origin server.
  • Rate Limiting: Implementing rate limiting on web servers and load balancers can help to slow down application-layer attacks by limiting the number of requests a single IP address can make in a given period.

Mitigation

  • Use a DDoS Protection Service: For any public-facing, mission-critical website, subscribing to a professional DDoS protection service is the most effective mitigation. These services are designed to handle large-scale attacks that would overwhelm on-premise defenses.
  • Scalable Infrastructure: Designing web applications on scalable cloud infrastructure can provide some resilience, allowing the system to automatically scale up to handle traffic spikes. However, this can become costly and is not a substitute for a dedicated protection service.
  • Geoblocking: If a service is only intended for a specific geographic region (e.g., Denmark), implementing geoblocking to deny traffic from other countries can reduce the attack surface, though this is easily bypassed by attackers using VPNs or proxies.
  • Incident Response Plan: Have a clear incident response plan for DDoS attacks. This should include contact information for your hosting provider and DDoS mitigation service, and defined procedures for activating mitigation measures.

Timeline of Events

1
November 16, 2025
On the eve of Danish municipal and regional elections, NoName057(16) launches DDoS attacks against multiple Danish websites.
2
November 17, 2025
This article was published

MITRE ATT&CK Mitigations

Using a cloud-based DDoS mitigation service acts as a specialized network intrusion prevention system to filter out malicious traffic.

Mapped D3FEND Techniques:

Configuring rate limiting and geoblocking on network appliances can help filter a portion of the malicious DDoS traffic.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most effective countermeasure against DDoS attacks like those from NoName057(16) is to use a specialized, cloud-based Inbound Traffic Filtering service, commonly known as a DDoS mitigation provider or Content Delivery Network (CDN). For the Danish government and political parties, this would mean routing all website traffic through a provider like Akamai, Cloudflare, or AWS Shield. These services have massive global networks capable of absorbing terabits of attack traffic. They use sophisticated techniques to distinguish between human users and malicious bots, filtering out the attack traffic at the edge of their network so that only legitimate requests reach the origin server. This prevents the target's own infrastructure from being overwhelmed, ensuring service availability even during a large-scale attack.

For early detection of a DDoS attack, organizations should implement Inbound Session Volume Analysis. This involves continuously monitoring the volume and rate of incoming network traffic and sessions to their web properties. By establishing a baseline of what constitutes normal traffic levels for different times of day and week, security teams can configure alerts to trigger when traffic volume exceeds a predefined threshold by a significant margin. For the Danish entities, a sudden spike of several hundred percent in HTTP requests would be a clear indicator of an impending DDoS attack. This early warning allows defenders to activate their incident response plan, notify their DDoS mitigation provider, and switch to a higher level of protection before the website becomes completely unavailable.

Sources & References

17th November – Threat Intelligence Report
Check Point Research (research.checkpoint.com) November 17, 2025
Hacker group brings down The Copenhagen Post website ahead of local elections
The Copenhagen Post (cphpost.dk) November 17, 2025
DDoSia Targets Denmark: A Clear Look at the Threat
SOCRadar (socradar.io) November 17, 2025
Danish political parties hit by cyberattack on election eve
The New Indian Express (newindianexpress.com) November 17, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

DDoShacktivismNoName057(16)pro-RussianDenmarkelections

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading