Moscow detains scientist suspected of carrying out DDoS attacks on Russia

Avatar

Russia’s Federal Security Service (FSB) has opened a criminal case against a scientist in Moscow suspected of carrying out distributed denial-of-service (DDoS) attacks on behalf of Ukraine’s intelligence agency.

The suspect, a physicist identified by local media as 33-year-old Artem Khoroshilov, has been accused of treason. If found guilty, he could potentially face a life sentence. Russia’s security service claims that the suspect has “confessed” to the charges.

According to media reports, the scientist allegedly contacted representatives of the Ukrainian special services after Moscow invaded Ukraine and was subsequently instructed to carry out DDoS attacks on Russian critical infrastructure and to collect data on Russian military personnel and the movement of military equipment.

The FSB also alleges that the suspect regularly transferred money and cryptocurrency to accounts of funds registered in Ukraine for the purchase of weapons, military equipment and gear for the Ukrainian armed forces.

Although information about the scientist’s arrest became public this week, it is likely that he was detained some time ago, as the alleged footage of the arrest published by local media was filmed in winter, in a snow-covered city.

In the video, several people in civilian clothes, with blurred faces, are seen pushing a man onto a snowy road and holding him on the ground before eventually dragging him into a bus. According to the FSB, the suspect is currently being held in a pre-trial detention facility.

This is not the first time Russian intelligence has detained local residents suspected of aiding Ukraine. In July, a Russian student was found guilty of passing the locations of Russian troops to Ukraine’s security service (SBU) and was sentenced to five years in a maximum-security colony.

In October, two Russian citizens were detained in Siberia for allegedly carrying out cyberattacks on Russian networks on behalf of Ukraine. If found guilty, they could face up to 20 years in prison on charges of treason.

Last year, three residents of the Russian city Rostov-on-Don were sentenced to prison or fined for carrying out DDoS attacks against Russian sites.

Recorded Future News couldn’t independently verify any of these reports.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Hackers deployed new malware against university in Taiwan

Next Post

‘Pro-Palestine’ hacking group banned on X as US criticizes Iran over cyberattacks

Related Posts

DigiCert to Revoke 83,000+ SSL Certificates Due to Domain Validation Oversight

Certificate authority (CA) DigiCert has warned that it will be revoking a subset of SSL/TLS certificates within 24 hours due to an oversight with how it verified if a digital certificate is issued to the rightful owner of a domain. The company said it will be taking the step of revoking certificates that do not have proper Domain Control Validation (DCV). "Before issuing a certificate to a
Avatar
Read More

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). "This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise, and unauthorized access to sensitive information
Avatar
Read More

Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins

Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker to sidestep authorization plugins (AuthZ) under specific circumstances. Tracked as CVE-2024-41110, the bypass and privilege escalation vulnerability carries a CVSS score of 10.0, indicating maximum severity. "An attacker could exploit a bypass using an API request with Content-Length set
Avatar
Read More