Share and Follow
The U.S. Department of Justice has accused a Ukrainian woman of participating in numerous cyberattacks targeting vital U.S. infrastructure. These attacks were allegedly orchestrated in collaboration with hackers supported by Russia, as revealed in newly unsealed indictments.
In addition, the State Department’s Rewards for Justice program is offering a reward of up to $10 million for information that leads to the capture of other members associated with one of the pro-Russian hacking groups linked to her.
Victoria Eduardovna Dubranova, aged 33, faced arraignment on Tuesday following her extradition to the United States earlier this year on a second federal indictment.
Known by several aliases, including Vika, Tory, and SovaSonya, Dubranova entered a plea of not guilty to charges stemming from her alleged involvement with two Russian-backed cyber operations, known as CyberArmyofRussia_Reborn (CARR) and NoName057(16).

According to prosecutors, these groups purportedly receive support from Russian government agencies to advance Russia’s geopolitical aims.
Prosecutors say both groups receive backing from Russian government bodies to push Russian geopolitical interests.
According to the DOJ, CARR was founded and funded by Russia’s military intelligence agency, the GRU, and operated a popular Telegram channel with more than 75,000 followers.
Officials allege the group’s attacks caused real-world harm, including damage to public water systems that spilled hundreds of thousands of gallons of drinking water.
They also cited a November 2024 breach at a Los Angeles meat processing facility that spoiled thousands of pounds of product and released ammonia.

DOJ charges Ukrainian woman with helping Russian hackers target US critical infrastructure. (Miguel Candela/SOPA Images/LightRocket via Getty Images)
“Today’s actions demonstrate the Department’s commitment to disrupting malicious Russian cyber activity – whether conducted directly by state actors or their criminal proxies – aimed at furthering Russia’s geopolitical interests,” said Assistant Attorney General for National Security John A. Eisenberg. “We remain steadfast in defending essential services, including food and water systems Americans rely on each day, and holding accountable those who seek to undermine them.”
NoName057(16), meanwhile, is described as a Russia-linked hacktivist group responsible for more than 1,500 attacks between March 2022 and June 2025.
Its targets included government agencies, telecommunications firms, military, financial institutions, and transportation authorities, also across Ukraine, Estonia, Finland, Lithuania, Norway, Poland, and Sweden.

NoName057(16) is described as a Russia-linked hacktivist group responsible for more than 1,500 attacks between March 2022 and June 2025. (Kurt “CyberGuy” Knutsson )
The group also claimed responsibility for cyberattacks on Dutch infrastructure ahead of and during the 2025 NATO Summit in The Hague.
These groups “are actively engaging in opportunistic, low-sophistication malicious cyber activity to gain notoriety and create mayhem,” said Chris Butera, CISA’s acting deputy executive assistant director for cybersecurity.
Dubranova faces up to five years in the NoName case and as many as 27 years in the CARR matter. Trials are set for February and April 2026.
Meanwhile, Rewards for Justice announced its $10 million reward with a pointed message aimed at other NoName participants: “They call themselves ‘NoName.’ But maybe YOU can name some names.” it read.
Fox News Digital has reached out to the DOJ for further comment.