Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian hackers

Avatar

Russian internet provider Nodex reported on Tuesday that its network had been ruined in a cyberattack, which it suspects originated from Ukraine.

In a statement on the Russian social media platform VKontakte, the St. Petersburg-based company said the “planned” attack “destroyed” its infrastructure overnight. Nodex added that it was working to restore systems from backups but could not provide a timeline for when operations would fully resume.

“Our priority is to restore telephony and the call center first,” the company stated.

In an update on Wednesday, Nodex announced that it had restored its DHCP server, which assigns IP addresses and network settings to devices. “Many people should now have internet access. Please restart your routers,” the company advised.

Data from the internet monitoring service NetBlocks shows that Nodex’s connectivity collapsed at midnight on Tuesday, affecting both fixed-line and mobile services.

The Nodex website remains inaccessible, and customers have been complaining about the disrupted services on the company’s official social media page.

A hacker group known as the Ukrainian Cyber Alliance claimed responsibility for the attack on Monday, stating that the company was “completely looted and wiped, and its data exfiltrated.” 

“The empty equipment without backups was left to them,” the hackers added. On their Telegram channel, the group shared screenshots of hacked systems and data they allegedly stole..

The Ukrainian Cyber Alliance is a community of pro-Ukraine cyber activists formed in 2016, and has targeted Russian entities since it invaded Ukraine nearly three years ago. Last October, the group claimed responsibility for knocking out parking enforcement in the Russian city of Tver. The year before, the hackers claimed to have breached Russia’s national card payment system and obtained user data. 

The attack on Nodex is one in a series of recent cyber incidents against Russia claimed by a Ukrainian group. Earlier in January, cyber specialists from Ukraine’s military intelligence (HUR) said they attacked the Russian railway system operator, destroying its servers, disabling workstations and wiping backups.

In December, HUR claimed responsibility for the attack on Gazprombank, one of the largest financial institutions in Russia, reportedly causing widespread disruptions and leaving “hundreds of thousands of Russians unable to complete money transfers or online payments.” The targeted companies did not publicly acknowledge the attacks.

CybercrimeGovernmentNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

UN aviation agency ICAO confirms its recruitment database was hacked

Next Post

Education software firm’s hack exposes personal data for students, teachers nationwide

Related Posts

The Future of Serverless Security in 2025: From Logs to Runtime Protection

Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration. But here is
Avatar
Read More

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft. The attack targeted publishers of browser extensions on the Chrome Web Store via a phishing campaign and used their access permissions to insert malicious code into legitimate extensions in order to steal
Avatar
Read More