Share this @internewscast.com
The United States Department of Justice has announced charges against a Ukrainian woman accused of participating in numerous cyberattacks targeting vital U.S. infrastructure. These attacks were reportedly conducted in collaboration with hackers supported by Russia, as detailed in newly revealed indictments.
In addition, the State Department’s Rewards for Justice initiative is offering a reward of up to $10 million for information that could lead to the capture of individuals connected to a pro-Russian hacking organization she is said to have been associated with.
Victoria Eduardovna Dubranova, who is 33 years old, faced arraignment on Tuesday for a second federal indictment. Her appearance in a U.S. court follows her extradition earlier this year.
Known by several aliases including Vika, Tory, and SovaSonya, Dubranova has pleaded not guilty to allegations of collaborating with two Russian-supported groups, namely CyberArmyofRussia_Reborn (CARR) and NoName057(16).

According to prosecutors, these groups are reportedly funded by Russian governmental entities to advance the nation’s geopolitical objectives.
Prosecutors say both groups receive backing from Russian government bodies to push Russian geopolitical interests.
According to the DOJ, CARR was founded and funded by Russia’s military intelligence agency, the GRU, and operated a popular Telegram channel with more than 75,000 followers.
Officials allege the group’s attacks caused real-world harm, including damage to public water systems that spilled hundreds of thousands of gallons of drinking water.
They also cited a November 2024 breach at a Los Angeles meat processing plant that spoiled thousands of pounds of product and released ammonia.

The DOJ charged a Ukrainian woman with helping Russian hackers target critical U.s. infrastructure. (Miguel Candela/SOPA Images/LightRocket via Getty Images)
“Today’s actions demonstrate the Department’s commitment to disrupting malicious Russian cyber activity — whether conducted directly by state actors or their criminal proxies — aimed at furthering Russia’s geopolitical interests,” said Assistant Attorney General for National Security John A. Eisenberg.
“We remain steadfast in defending essential services, including food and water systems Americans rely on each day, and holding accountable those who seek to undermine them.”
NoName057(16) is described as a Russia-linked hacktivist group responsible for more than 1,500 attacks between March 2022 and June 2025.
Its targets included government agencies, telecommunications firms, the military, financial institutions and transportation authorities across Ukraine, Estonia, Finland, Lithuania, Norway, Poland and Sweden.

NoName057(16) is described as a Russia-linked hacktivist group responsible for more than 1,500 attacks between March 2022 and June 2025. (Kurt “CyberGuy” Knutsson )
The group also claimed responsibility for cyberattacks on Dutch infrastructure ahead of and during the 2025 NATO Summit in The Hague.
These groups “are actively engaging in opportunistic, low-sophistication malicious cyber activity to gain notoriety and create mayhem,” said Chris Butera, CISA’s acting deputy executive assistant director for cybersecurity.
Dubranova faces up to five years in the NoName case and as many as 27 years in the CARR matter. Trials are set for February and April 2026.
Rewards for Justice announced its $10 million reward with a pointed message aimed at other NoName participants: “They call themselves ‘NoName.’ But maybe YOU can name some names,” it said.
Fox News Digital has reached out to the DOJ for further comment.