A newly formed Russian hacker alliance has launched a coordinated cyberattack targeting Denmark, raising concerns across government agencies, businesses, and critical service providers. The attacks follow a public demand by the group asking Denmark to halt a large military aid package meant for Ukraine. When the demand was ignored, the hackers moved quickly to disrupt digital services.
Online messages shared by the attackers showed clear intent to cause disruption and pressure decision-makers. Several Danish websites experienced outages, slow responses, or temporary shutdowns. While no physical damage was reported, the digital interruptions affected daily operations and created uncertainty among users who rely on online systems.
Russian Legion, Inteid, and Cardinal Announce Digital Offensive
The cyber campaign is led by a group calling itself Russian Legion, working alongside allied groups Inteid and Cardinal. The alliance announced its actions through Telegram, where it posted warnings, screenshots, and updates about ongoing attacks.
Hackers breach networks of Bumble, Panera, and Match in coordinated cyberattacks
The hackers directly linked the cyber offensive to Denmark’s approval of a 1.5 billion Danish kroner military aid package for Ukraine. Their messages stated that the attacks were meant to pressure the Danish government by disrupting public and private digital services.
The first warning appeared in late January, when the group threatened to begin with basic cyber disruptions. These early actions were described as only the beginning. Shortly after, several Danish company websites were reported as unavailable or unstable.
Over a 48-hour period, the Russian Legion claimed responsibility for repeated attacks on Danish firms and public bodies. The energy sector was mentioned frequently, causing concern because even brief disruptions in energy-related services can affect homes, hospitals, and businesses.
The group announced a major coordinated wave scheduled for February 2, timing it to affect multiple targets at once. Government websites, private companies, and essential service platforms were all listed as possible targets.
At the time of reporting, there were no nationwide public alerts. Some organizations quietly confirmed brief outages, while others worked to stabilize their systems without public statements.
What Is a DDoS Attack and Why It Matters
The main method used in this cyber campaign is known as a Distributed Denial of Service, or DDoS, attack. This type of attack does not steal information. Instead, it overwhelms websites or online systems with huge amounts of fake traffic.
Russian-Linked Hackers Nearly Shut Down Poland’s Power and Heating in Winter Cyber Strike
To explain simply, it is like thousands of people trying to enter a small shop at the same time. The doors get blocked, and real customers cannot get in. That is how DDoS attacks push websites offline.
Russian Legion and its partners reportedly used large networks of infected computers, known as botnets. These machines send useless requests all at once, flooding servers until they slow down or crash.
Screenshots shared online by the attackers showed Danish websites that were unreachable. These posts were meant to prove that the attacks were working and to spread concern among users and organizations.
The group also hinted at possible escalation. They suggested that future actions could include more damaging cyber techniques such as data destruction or ransomware. While no confirmed reports of data loss appeared at this stage, the threat itself increased pressure on targeted organizations.
Cybersecurity experts note that many such groups rely on low-cost tools available online. Even simple tools can generate extremely high traffic levels capable of disrupting major websites.
Cyber Pressure, State Alignment, and Ongoing Disruptions
Cybersecurity firm Truesec has linked the Russian Legion to a wider pattern of pro-Russian cyber activity seen across Europe since the start of the Ukraine war in 2022. These groups are often described as state-aligned, though not officially funded by governments.
Since 2022, cyber intrusions linked to geopolitical tensions have increased sharply. Many attacks combine technical disruption with online messaging meant to spread fear and uncertainty.
U.S. launches sweeping Green Card crackdown on 19 nations after White House
attack triggers security panic
By using Telegram to post frequent updates, groups like the Russian Legion amplify the impact of their attacks. Even short outages can feel larger when paired with public claims and screenshots.
Past incidents in Nordic and Baltic countries show that such attacks often remain limited to DDoS activity. Still, temporary downtime can be costly. Previous regional cyber disruptions caused financial losses and delayed services.
Denmark’s situation follows similar patterns seen in Norway and Finland during political disputes linked to Ukraine support. In response, many organizations rely on protection services from companies like Cloudflare and Akamai to filter harmful traffic.
As the cyber activity continues, Danish organizations remain focused on keeping essential digital services running while monitoring further disruptions tied to the ongoing pressure campaign.



