Sund & Bælt
November 14, 2025
•[ DDoS, Denial-of-service, Hacktivism ]
On November 14, 2025, the Storeblt website operated by Sund & Blt was rendered inaccessible due to an external denial-of-service attack. Sund & Blt confirmed the DDoS incident, and DR reported that the pro-Russian hacktivist group NoName057(16) claimed responsibility on Telegram as part of a broader campaign targeting Danish entities. No data loss occurred.
Borger.dk
November 13, 2025
•[ denial of service, hacktivism ]
On November 13, 2025, Denmark's national citizen service portal Borger.dk was targeted and disrupted by an external denial-of-service attack. The pro-Russian hacktivist group NoName057(16) claimed responsibility on Telegram. No data loss occurred.
Ministry of Transport of Denmark
November 13, 2025
•[ ddos, hacktivism, government ]
On November 13, 2025, the website of Denmark's Ministry of Transport was disrupted by an external denial-of-service attack. The pro-Russian hacktivist group NoName057(16) claimed responsibility for the attack as part of a broader campaign targeting Danish digital infrastructure. No data loss was reported.
Terma
November 13, 2025
•[ denial of service, hacktivism ]
On November 13, 2025, Danish defense contractor Terma experienced a disruption to its public-facing website due to an external denial-of-service attack. The incident was attributed to the pro-Russian hacktivist group NoName057(16). Terma confirmed that no data were lost.
Government of Denmark
November 13, 2025
•[ denial of service, hacktivism, government ]
On November 13, 2025, additional Danish government websites experienced outages due to external denial-of-service attacks. The Danish Civil Protection Agency confirmed that several sites and companies were affected, and the pro-Russian hacktivist group NoName057(16) claimed responsibility for the coordinated campaign. No data loss was reported.
Mikord
November 12, 2025
•[ data leak, sabotage, hacktivism ]
The Record reported that an anonymous hacker group allegedly breached Mikords servers and provided a trove of internal documents to an anti-war human rights group, including source code, technical and financial records, and internal correspondence. The report stated the hackers claimed months-long access and said they destroyed parts of Mikords infrastructure; Mikords website was reportedly offline for days and had been defaced earlier in December. While the company did not publicly acknowledge involvement in Russias military registry, investigative verification cited in the article indicated the leaked materials supported its participation, suggesting the breach had both data-theft and disruptive/destructive elements.
Ghent University Hospital
November 6, 2025
•[ denial of service, hacktivism ]
According to Belgian News Agency coverage relayed by DataBreaches.net, pro Russian hacktivist group NoName057 claimed responsibility on Telegram for a distributed denial of service attack that briefly disrupted the public websites of Belgian telecom operators Proximus and Scarlet, as well as Ghent University Hospital, on a Wednesday morning in November 2025. Proximus said technicians detected unusual traffic around 7:20 and a sharp rise in volume shortly after, but countermeasures meant overall impact on service was very limited and core systems remained resilient. The group also boasted of targeting an internal Telenet portal, a claim Telenet publicly rejected, emphasizing that its systems were not hacked and no sites went offline, and authorities noted that such DDoS attacks do not involve any compromise of user data.
Scarlet
November 6, 2025
•[ ddos, hacktivism ]
Pro-Russian hacktivist group NoName057 claimed responsibility for a distributed denial-of-service attack that briefly disrupted the public websites of Belgian telecom operators Proximus and Scarlet and Ghent University Hospital in November 2025. According to the Belgian News Agency, Proximus technicians detected unusual traffic around 7:20 a.m., saw a sharp spike by 7:30, and deployed countermeasures that kept core systems running so overall impact on services remained very limited. Officials stressed that the DDoS campaign affected website availability only and did not involve any intrusion into internal networks or compromise of customer data.
Belgian General Intelligence and Security Service
November 6, 2025
•[ DDoS, hacktivism ]
Belgiums Defense Ministry confirmed that the website of the military intelligence service SGRS was hit by a DDoS attack claimed by pro-Russian hacktivist group NoName057, briefly degrading access to the portal without leading to any intrusion into backend systems or exposure of sensitive data; in messages on Telegram the group framed the operation as a warning to Defense Minister Theo Francken over his remarks that NATO would devastate Moscow if Russia attacked Brussels, continuing a pattern of politically motivated nuisance attacks on Belgian government and strategic targets.
Rosselkhoznadzor
October 22, 2025
•[ ddos, hacktivism ]
Large DDoS hit Russias food-safety agency, degrading VetIS/Mercury and Saturn services used to certify shipments; suppliers couldnt confirm deliveries and some retailers paused intake until access returned. Officials reported no data compromise, indicating a protest-driven disruption rather than theft.
Ravin Academy
October 22, 2025
•[ hacktivism, data leak, government ]
Cyber intrusion into Ravin Academy, an Iranian cybersecurity training institution linked to the Ministry of Intelligence, by a hacktivist group. The stolen data was posted online with anti-regime rhetoric, indicating an ideologically motivated protest hack.
Windsor International Airport
October 14, 2025
•[ hacktivism, unauthorized access, third-party breach ]
Unauthorized pro-Palestinian messages played; one Delta flight delayed; third-party cloud PA cited
Kelowna International Airport
October 14, 2025
•[ hacktivism, system intrusion ]
Pro-Palestinian messages appeared on PA/displays; brief disruption while systems isolated and restored
(German Procurement Portal) dtvp.de
October 14, 2025
•[ ddos, hacktivism ]
Reports say pro-Russian NoName057(16) knocked Germanys tender portal offline via DDoS
MAYA Systems Ltd.
October 12, 2025
•[ data leak, hacktivism, espionage ]
An Iran-linked hacktivist group known as Cyber Toufan claimed responsibility for breaching Israeli defense contractor MAYA Systems in October 2025, stealing and releasing files allegedly showing Iron Beam laser-defense system designs and other IDF technologies. Israeli authorities have not verified the authenticity of the leaked materials.
Canadian water facility
October 1, 2025
•[ hacktivism, critical infrastructure, industrial control system ]
Hacktivists tampered with water-pressure valves at a Canadian water facility, degrading water service to the local community; actions intended to draw attention to activist causes.
Undisclosed Canadian oil & gas company
October 1, 2025
•[ hacktivism, operational technology ]
Hacktivists manipulated an automated tank gauge system at a Canadian oil & gas company, triggering erroneous alarms; no injuries or physical damage reported.
Undisclosed Canadian farm
October 1, 2025
•[ Hacktivism, Sabotage, Operational Technology (OT) ]
Hacktivists manipulated temperature and humidity parameters in a grain-drying silo at a Canadian farm, creating unsafe conditions that were detected and mitigated before damage occurred.
AutoritàPortuale del Mar Ligure Occidentale and Regione Liguria
September 23, 2025
•[ DDoS, hacktivism, pro-Russian ]
On September 23, 2025, the pro-Russian hacktivist group Noname057 launched a distributed denial-of-service (DDoS) attack targeting the websites of Ligurias regional government and the Port Authority of the Western Ligurian Sea. The attack caused only partial service degradation and web slowdowns before being mitigated by Liguria Digitale and Italys cybersecurity agency. No data theft was reported.
Czech Police, Interior Ministry, and other government offices
July 31, 2025
•[ government, hacktivism ]
iRozhlas reports hackers attacked Czech police and government websites in retaliation for cooperation in Ukraine-related operations.