Poland detains Russian citizen suspected of hacking local firms

Polish authorities detained a Russian citizen suspected of hacking into the IT systems of local companies — the latest in a series of cases Warsaw has linked to Moscow’s expanding sabotage and espionage efforts.

Interior Minister Marcin Kierwiński said Thursday that police arrested the man for breaching security systems to gain access to company databases. A more detailed statement from the Krakow prosecutor’s office said the suspect allegedly hacked into an online retailer’s systems without authorization and manipulated its databases in ways that could have disrupted operations and endangered customers.

The suspect, whose identity has not been disclosed, illegally crossed into Poland in 2022 and obtained refugee status the following year. He has been placed in temporary custody while the investigation continues.

Authorities believe the man may be linked to additional cybercriminal activity targeting companies in Poland and across the EU, and are still assessing the scale of the possible damage.

Poland has repeatedly warned of heightened Russian intelligence activity since Moscow’s full-scale invasion of Ukraine. Prime Minister Donald Tusk said in July that 32 people — including Polish, Russian, Ukrainian, Belarusian and Colombian nationals — had been detained on suspicion of working with Russian services to carry out sabotage and arson attacks.

Earlier this year, Warsaw closed the Russian consulate in Krakow after linking Moscow’s intelligence services to a 2023 fire that destroyed a major shopping mall in Warsaw. Last week, Poland shut down the last remaining Russian consulate in the country after authorities said Russian intelligence was suspected of involvement in an explosion on a Polish railway line, which officials described as an act of sabotage.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Next Post

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Related Posts

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been linked to a number of hyper-volumetric DDoS attacks over the past year. The attack lasted for 69
Read More

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. "This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity," researchers Nick
Read More

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that's designed to facilitate device takeover (DTO) attacks for financial theft. The malware, according to ThreatFabric, masquerades as seemingly harmless IPTV apps to deceive victims, indicating that the activity is primarily singling out users looking for the online TV applications. "This new threat, while
Read More