Hacktivists, Proxy Groups, Cyber Volunteers
The Future of Non-State Actors’ Involvement in Military Cyber Operations
Copyright (c) 2025 Krasznay Csaba

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The copyright to this article is transferred to the University of Public Service Budapest, Hungary (for U.S. government employees: to the extent transferable) effective if and when the article is accepted for publication. The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The author warrants that this contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.
An author may make an article published by University of Public Service available on a personal home page provided the source of the published article is cited and University of Public Service is mentioned as copyright holder
Abstract
This paper explores the involvement of hacktivists, cyber volunteers and proxy groups in military cyber operations, with a particular focus on their roles in the ongoing Russian–Ukrainian war. The research aims to analyse the participation of these non-state actors, their legal implications, and how their involvement could influence the strategic, operational and tactical practices of small and medium-sized NATO member states, such as Hungary. Drawing from case studies, literature review and in-depth interviews with Hungarian military intelligence and public administration leaders, the paper formulates two hypotheses: 1. Hacktivist groups, unless integrated into a state’s cyber strategy, hinder tactical objectives and raise significant international legal concerns; and 2. Such groups pose a strategic threat to small NATO countries, including Hungary. The findings emphasise the necessity for NATO states to consider how to engage and regulate cyber volunteers effectively, while minimising the risks posed by hacktivist and proxy groups. Additionally, the research underscores the lack of a unified legal framework governing the use of these non-state actors, which complicates their regulation and control in cyberspace conflicts. The paper concludes with recommendations for how NATO states can leverage the openness of civilians to participate in cyber defence while maintaining legal and operational oversight, supporting the involvement of various cyber groups within the framework of international law.
Keywords:
How to Cite
References
ASHDOWN, Neil (2024): Unity or Coherence: Shaping Future Civil–Military Intelligence Collaboration in the Cyber Domain. In KWAN, Claire – LINDSTRÖM, Lauri – GIOVANELLI, Davide – PODIŅŠ, Kārlis – ŠTRUCL, Damjan (eds.): CyCon 2024: Over the Horizon. 16th International Conference on Cyber Conflict. Tallinn: NATO CCDCoE, 311–325. Online: https://doi.org/10.23919/CyCon62501.2024.10685631
ANTONIUK, Daryna (2023): What’s in a NoName? Researchers See a Lone-wolf DDoS Group. The Record, 4 September 2023. Online: https://therecord.media/noname-hacking-group-targets-ukraine-and-allies
BREWSTER, Thomas (2022): An ‘Unhappy American’ in the Russia–Ukraine Information War Promises a Huge Leak of Data Stolen from the Kremlin’s Internet Censor. Forbes, 10 march 2022. Online: https://www.forbes.com/sites/thomasbrewster/2022/03/10/dddosecrets-in-the-russia-ukraine-information-war-promises-a-huge-leak-of-data-stolen-from-the-kremlins-internet-censor/
CHAN, Kristy – KHAW, Joseph (2024): Not All Those Who Wander (Over the Horizon) Are Lost: The Applicability of Existing Paradigms of International Law to Cyberspace and the Interpretation of Customary International Law. In KWAN, Claire – LINDSTRÖM, Lauri – GIOVANELLI, Davide – PODIŅŠ, Kārlis – ŠTRUCL, Damjan (eds.): CyCon 2024: Over the Horizon. 16th International Conference on Cyber Conflict. Tallinn: NATO CCDCoE, 177–190. Online: https://doi.org/10.23919/CyCon62501.2024.10685595
Cyberint Research Team (2023): Behind the Mask of Anonymous Sudan: An Analysis. Online: https://cyberint.com/blog/research/anonymous-sudan-an-analysis/
Cyberknow (2024): CyberTracker Update 26. Russia–Ukraine War. Online: https://cyberknow.substack.com/p/cybertracker-update-26-russia-ukraine
FOWLER, Jeremiah (2022): Is Anonymous Rewriting the Rules of Cyberwarfare? Timeline of Their Attacks against the Russian Government. Online: https://www.websiteplanet.com/blog/anonymous-cyberwarfare-report/
FORNUSEK, Martin (2024): Ministry: Ukrainian Hackers Disrupt Transport Services in Russian Cities. The Kyiv Independent, 13 March 2024. Online: https://kyivindependent.com/ministry-ukrainian-hackers-disrupt-payment-system-in-moscow-subway/
Government of France (2018): Paris Call for Trust and Security in Cyberspace. Online: https://pariscall.international/en/principles
Government of Hungary (2020): Government Resolution 1163/2020 (IV. 21.) on Hungary’s National Security Strategy. Online: https://honvedelem.hu/hirek/government-resolution-1163-2020-21st-april.html
Government of Ireland (2019): National Cyber Security Strategy. Online: https://www.ncsc.gov.ie/pdfs/National_Cyber_Security_Strategy.pdf
Government of Portugal (2019): Estratégia Nacional de Segurança do Ciberespaço 2019–2023. Online: https://files.diariodarepublica.pt/1s/2019/06/10800/0288802895.pdf?lang=EN
GYURÁK, Gábor (2024): A katonai kibertér műveletek lehetséges kapcsolódási pontjai a Pécsi Tudományegyetem kibertérrel kapcsolatos kutatásaihoz. Nemzetközi Katonai Kibertér Műveleti Konferencia, Szentendre, 7 March 2024.
HEALEY, Jason – GRINBERG, Olivia (2022): ‘Patriotic Hacking’ Is No Exception. Online: https://www.lawfaremedia.org/article/patriotic-hacking-no-exception
JORDAN, Tim – TAYLOR, Paul A. (2004): Hacktivism and Cyberwars. Rebels with a Cause? London – New York: Routledge. Online: https://doi.org/10.4324/9780203490037
KARATZOGIANNI, Athina (2015): Firebrand Waves of Digital Activism 1994–2014. The Rise and Spread of Hacktivism and Cyberconflict. London: Palgrave Macmillan. Online: https://doi.org/10.1057/9781137317933
KIM-MCLEOD, Riam (2024): Russia–Ukraine War: Telegram-based Hacktivism in 2023. SecAlliance, 27 February 2024. Online: https://www.secalliance.com/blog/russia-ukraine-war-telegram-based-hacktivism-in-2023
KOVÁCS, László – KRASZNAY, Csaba (2010): A Digital Mohács. A Cyber Attack Scenario against Hungary. Nemzet és Biztonság: Biztonságpolitikai Szemle, 3(Special Issue), 49–59.
KOVAL, Nikolay (2015): Cyber War in Perspective: Russian Aggression against Ukraine. In GEERS, Kenneth (ed.): Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCDCoE, 55–58.
LOWE, Christian (2009): Kremlin Loyalist Says Launched Estonia Cyber-Attack. Reuters, 13 March 2009. Online: https://www.reuters.com/article/us-russia-estonia-cyberspace-idUSTRE52B4D820090313/
OTTIS, Rain (2008): Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective. Tallinn: NATO CCDCoE. Online: https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf
OTTIS, Rain (2011): A Systematic Approach to Offensive Volunteer Cyber Militia. Tallinn: TUT Press.
ROMAGNA, Marco (2019): Hacktivism: Conceptualization, Techniques, and Historical View. In HOLT, Thomas J. – BOSSLER, Adam M. (eds.): The Palgrave Handbook of International Cybercrime and Cyberdeviance. Cham: Springer, 1–27. Online: https://doi.org/10.1007/978-3-319-90307-1_34-1
RUFFIN, Oxblood (2010): Hacktivism: From Here to There. Threat Post, 9 December 2010. Online: https://threatpost.com/hacktivism-here-there-120910/74759/
Sekoia TDR – Amaury G. – Maxime A. (2024): NoName057(16)’s DDoSia Project: 2024 Updates and Behavioural Shifts. Sekoia, 1 March 2024. Online: https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/
SCHMITT, Michael N. ed. (2017): Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press. Online: https://doi.org/10.1017/9781316822524
SCHMITT, Michael N. – VIHUL, Liis (2014): Proxy Wars in Cyber Space: The Evolving International Law of Attribution. Fletcher Security Review, 1(2), 54–73.
SMITH, Margaret W. – DEAN, Thomas (2023): The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine Conflict. In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon). Tallinn: IEEE, 103–119. Online: https://doi.org/10.23919/CyCon58705.2023.10182061
SOESANTO, Stefan (2022): The IT Army of Ukraine: Structure, Tasking, and Eco-System. CSS Cyberdefense Reports, June 2022. Online: https://doi.org/10.3929/ETHZ-B-000552293
SUN TZU (2006): The Art of War. Minneapolis: Filiquarian Publishing.
THØGERSEN, Marie (2023): Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon). Tallinn: IEEE, 39–54. Online: https://doi.org/10.23919/CyCon58705.2023.10182021
TUROVSKY, Daniil (2018): “It’s Our Time to Serve the Motherland” How Russia’s War in Georgia Sparked Moscow’s Modern-day Recruitment of Criminal Hackers. Meduza, 7 August 2018. Online: https://meduza.io/en/feature/2018/08/07/it-s-our-time-to-serve-the-motherland
UCMC (2016): Security Service of Ukraine Possesses Audio Records of Krasnov’s Conversations with his Russian Supervisor. Ukraine Crisis Media Center, 3 March 2016. Online: https://uacrisis.org/en/40837-sbu-3
United Nations General Assembly (2013): Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/68/98. New York: United Nations. Online: https://documents.un.org/doc/undoc/gen/n13/371/66/pdf/n1337166.pdf?token=j2rtp8zdWwLTUkk6bu&fe=true
United States District Court for the District of Alaska (2017): United States Versus Peter Yuryevich Levashov. Online: https://www.justice.gov/opa/press-release/file/956511/dl
U.S. Department of Justice (2018): Russian National Who Operated Kelihos Botnet Pleads Guilty to Fraud, Conspiracy, Computer Crime and Identity Theft Offenses. Office of Public Affairs, 12 September 2018. Online: https://www.justice.gov/opa/pr/russian-national-who-operated-kelihos-botnet-pleads-guilty-fraud-conspiracy-computer-crime