Hackers knock out systems at Moscow-run postal operator in occupied Ukraine

A Russian state-owned postal operator in occupied eastern Ukraine said Monday its systems were disrupted by “external interference” after a pro-Ukraine hacktivist group claimed it had wiped thousands of the company’s devices.

Donbas Post, which operates in the Russian-controlled parts of Donetsk and Luhansk, said the incident affected its corporate network, web platform and email systems. The company had restricted access to several services to contain the breach and was working to restore operations.

The statement came after the Ukrainian Cyber Alliance (UCA) said Friday it had carried out the attack, claiming that more than 1,000 workstations, around 100 virtual machines and “several dozen terabytes” of data were destroyed. The group also published screenshots it said were taken from Donbas Post’s internal systems.

The disruption coincided with a reported Ukrainian drone strike on energy infrastructure in the occupied region last week, which authorities claimed left half a million people without power. Donbas Post said it had suspended work at postal branches and its call center due to the power outages. It is unclear whether the cyberattack and the drone strike were coordinated or simply occurred at the same time.

UCA, a network of pro-Ukrainian cyber activists formed in 2016, has stepped up operations since Russia’s full-scale invasion in 2022. The group has previously claimed attacks on Russian financial firms, internet providers and municipal systems, including incidents affecting microfinance company CarMoney, telecom operator Nodex and parking operations.

Russian-occupied areas of Ukraine have become frequent targets for hacktivist groups and state-backed cyber actors. In 2023, researchers at Russia’s Kaspersky Lab said they had identified a new malware strain used for surveillance of government agencies and agriculture and transport organizations in the Donetsk, Luhansk and Crimea regions, which Moscow seized in 2014. The Cloud Atlas cyber-espionage group has also been observed targeting high-profile entities in the occupied territories.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Next Post

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Related Posts

Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Cisco has warned of a high-severity security flaw in IOS Software and IOS XE Software that could allow a remote attacker to execute arbitrary code or trigger a denial-of-service (DoS) condition under specific circumstances. The company said the vulnerability, CVE-2025-20352 (CVSS score: 7.7), has been exploited in the wild, adding it became aware of it "after local Administrator credentials were
Read More

SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats

A European embassy located in the Indian capital of New Delhi, as well as multiple organizations in Sri Lanka, Pakistan, and Bangladesh, have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder in September 2025. The activity "reveals a notable evolution in SideWinder's TTPs, particularly the adoption of a novel PDF and ClickOnce-based infection chain, in
Read More

How Attackers Bypass Synced Passkeys

TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong
Read More