Hackers knock out systems at Moscow-run postal operator in occupied Ukraine

A Russian state-owned postal operator in occupied eastern Ukraine said Monday its systems were disrupted by “external interference” after a pro-Ukraine hacktivist group claimed it had wiped thousands of the company’s devices.

Donbas Post, which operates in the Russian-controlled parts of Donetsk and Luhansk, said the incident affected its corporate network, web platform and email systems. The company had restricted access to several services to contain the breach and was working to restore operations.

The statement came after the Ukrainian Cyber Alliance (UCA) said Friday it had carried out the attack, claiming that more than 1,000 workstations, around 100 virtual machines and “several dozen terabytes” of data were destroyed. The group also published screenshots it said were taken from Donbas Post’s internal systems.

The disruption coincided with a reported Ukrainian drone strike on energy infrastructure in the occupied region last week, which authorities claimed left half a million people without power. Donbas Post said it had suspended work at postal branches and its call center due to the power outages. It is unclear whether the cyberattack and the drone strike were coordinated or simply occurred at the same time.

UCA, a network of pro-Ukrainian cyber activists formed in 2016, has stepped up operations since Russia’s full-scale invasion in 2022. The group has previously claimed attacks on Russian financial firms, internet providers and municipal systems, including incidents affecting microfinance company CarMoney, telecom operator Nodex and parking operations.

Russian-occupied areas of Ukraine have become frequent targets for hacktivist groups and state-backed cyber actors. In 2023, researchers at Russia’s Kaspersky Lab said they had identified a new malware strain used for surveillance of government agencies and agriculture and transport organizations in the Donetsk, Luhansk and Crimea regions, which Moscow seized in 2014. The Cloud Atlas cyber-espionage group has also been observed targeting high-profile entities in the occupied territories.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Next Post

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Related Posts

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

Salesforce has warned of detected "unusual activity" related to Gainsight-published applications connected to the platform. "Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data through the app's connection," the company said in an advisory. The cloud services firm said it has taken the step of revoking all active access and refresh
Read More

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE-2025-43300 (CVSS score: 8.8), an out-of-bounds write issue in the ImageIO component that could result in memory corruption when processing a malicious image file. "Apple is aware of a report that this issue may have been exploited in an
Read More