The UK's National Cyber Security Centre, in collaboration with allies, has identified a series of hacking attempts by Russian military intelligence against organizations providing support to Ukraine.
UK Unveils Russian Cyber Operations Aimed at Undermining Support for Ukraine

UK Unveils Russian Cyber Operations Aimed at Undermining Support for Ukraine
A new investigation reveals a coordinated cyber campaign by Russia targeting entities aiding Ukraine.
The UK government has revealed a comprehensive investigation into a "malicious cyber campaign" orchestrated by Russia, specifically aimed at undermining support for Ukraine amidst the ongoing conflict. The findings, published by the UK’s National Cyber Security Centre (NCSC), shed light on the extent of these cyber attacks which have been targeting various public and private organizations since 2022.
In collaboration with partners including the US, Germany, and France, the NCSC reported on the activities of a Russian military unit known as GRU Unit 26165, which is informally referred to as Fancy Bear. This notorious group is infamous for its previous cybercrimes, including the 2016 breach of the US Democratic National Committee and leaking data from the World Anti-Doping Agency.
The report identifies several targets of this cyber campaign, notably defense suppliers, IT service providers, and logistics operators that are critical to Ukraine's war efforts. A staggering number of around 10,000 internet-connected cameras, particularly those located near military sites and rail stations in Ukraine, were compromised. This allowed Russian operatives to monitor aid shipments and track material movements into the country. Some of these attacks utilized legitimate traffic cameras to facilitate their espionage.
Paul Chichester, the Director of Operations at NCSC, emphasized the serious implications of these cyber attacks. “This malicious campaign by Russia's military intelligence service presents a serious risk to targeted organizations, including those involved in the delivery of assistance to Ukraine,” he stated. He urged affected entities to take the advisory guidance seriously and strengthen their defenses against such persistent threats.
As the situation unfolds, it becomes increasingly evident that cyber warfare has emerged as a significant battlefield in the wider conflict, with implications reaching far beyond national borders and affecting the global response to the crisis in Ukraine.
In collaboration with partners including the US, Germany, and France, the NCSC reported on the activities of a Russian military unit known as GRU Unit 26165, which is informally referred to as Fancy Bear. This notorious group is infamous for its previous cybercrimes, including the 2016 breach of the US Democratic National Committee and leaking data from the World Anti-Doping Agency.
The report identifies several targets of this cyber campaign, notably defense suppliers, IT service providers, and logistics operators that are critical to Ukraine's war efforts. A staggering number of around 10,000 internet-connected cameras, particularly those located near military sites and rail stations in Ukraine, were compromised. This allowed Russian operatives to monitor aid shipments and track material movements into the country. Some of these attacks utilized legitimate traffic cameras to facilitate their espionage.
Paul Chichester, the Director of Operations at NCSC, emphasized the serious implications of these cyber attacks. “This malicious campaign by Russia's military intelligence service presents a serious risk to targeted organizations, including those involved in the delivery of assistance to Ukraine,” he stated. He urged affected entities to take the advisory guidance seriously and strengthen their defenses against such persistent threats.
As the situation unfolds, it becomes increasingly evident that cyber warfare has emerged as a significant battlefield in the wider conflict, with implications reaching far beyond national borders and affecting the global response to the crisis in Ukraine.