Hackers knock out systems at Moscow-run postal operator in occupied Ukraine

A Russian state-owned postal operator in occupied eastern Ukraine said Monday its systems were disrupted by “external interference” after a pro-Ukraine hacktivist group claimed it had wiped thousands of the company’s devices.

Donbas Post, which operates in the Russian-controlled parts of Donetsk and Luhansk, said the incident affected its corporate network, web platform and email systems. The company had restricted access to several services to contain the breach and was working to restore operations.

The statement came after the Ukrainian Cyber Alliance (UCA) said Friday it had carried out the attack, claiming that more than 1,000 workstations, around 100 virtual machines and “several dozen terabytes” of data were destroyed. The group also published screenshots it said were taken from Donbas Post’s internal systems.

The disruption coincided with a reported Ukrainian drone strike on energy infrastructure in the occupied region last week, which authorities claimed left half a million people without power. Donbas Post said it had suspended work at postal branches and its call center due to the power outages. It is unclear whether the cyberattack and the drone strike were coordinated or simply occurred at the same time.

UCA, a network of pro-Ukrainian cyber activists formed in 2016, has stepped up operations since Russia’s full-scale invasion in 2022. The group has previously claimed attacks on Russian financial firms, internet providers and municipal systems, including incidents affecting microfinance company CarMoney, telecom operator Nodex and parking operations.

Russian-occupied areas of Ukraine have become frequent targets for hacktivist groups and state-backed cyber actors. In 2023, researchers at Russia’s Kaspersky Lab said they had identified a new malware strain used for surveillance of government agencies and agriculture and transport organizations in the Donetsk, Luhansk and Crimea regions, which Moscow seized in 2014. The Cloud Atlas cyber-espionage group has also been observed targeting high-profile entities in the occupied territories.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Next Post

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Related Posts

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool's protections. Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a security scanner that's designed to parse Python pickle files and detect suspicious
Read More

The Case for Dynamic AI-SaaS Security as Copilots Scale

Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants or agent-like features. Virtually every major SaaS vendor has rushed to embed AI into their offerings. The result is an explosion of AI capabilities across
Read More

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with BlackCat (aka ALPHV) ransomware between May and November 2023 and extorting them. Ryan Clifford Goldberg, Kevin Tyler Martin, and an unnamed co–conspirator (aka "Co-Conspirator 1") based in Florida, all U.S. nationals, are said to have used the ransomware strain against a medical
Read More