Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

Avatar
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia’s Federal Security Service (FSB) that involves recruiting Ukrainian minors for criminal activities under the guise of “quest games.” Law enforcement officials said that it detained two FSB agent groups following a special operation in Kharkiv. These groups, per the agency,

The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia’s Federal Security Service (FSB) that involves recruiting Ukrainian minors for criminal activities under the guise of “quest games.”

Law enforcement officials said that it detained two FSB agent groups following a special operation in Kharkiv. These groups, per the agency, consisted exclusively of children aged 15 and 16.

“The minors carried out hostile tasks of conducting reconnaissance, correcting strikes, and arson,” the SSU said in a statement released Friday. “To mask subversive activities, both enemy cells operated separately from each other.”

As per the quest game rules set by the FSB, the children were given geographic coordinates, after which they were instructed to get to the location, take photos and videos of targets, and provide a general description of the surrounding area.

The results of these reconnaissance missions were subsequently shared to the Russian intelligence agency via anonymous chats. The SSU said the information gathered from these activities was used to carry out airstrikes in Kharkiv.

Ukraine’s principal security arm also revealed that it has detained “all members of the enemy groups” who were found taking photos of air defense facilities in the country. One of the organizers has been taken into custody and faces life imprisonment.

Also charged in connection with the efforts is a “liaison” of the FSB agent groups, a police officer from the Krasnodar region of Russia. He has been charged in absentia under Part 2 of Article 113 of the Criminal Code of Ukraine, which relates to acts of sabotage committed under martial law.

The development comes as the Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new set of cyber attacks that it said were aimed at defense companies in the country as well as its security and defense forces. The intrusions have been attributed to a Russia-linked actor tracked as UAC-0185.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Previous Post

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

Next Post

NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool

Related Posts

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to leak sensitive data. "The vulnerabilities range in severity: in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext," ETH Zurich researchers Jonas Hofmann and Kien Tuong Truong
Avatar
Read More