Poland detains Russian citizen suspected of hacking local firms

Polish authorities detained a Russian citizen suspected of hacking into the IT systems of local companies — the latest in a series of cases Warsaw has linked to Moscow’s expanding sabotage and espionage efforts.

Interior Minister Marcin Kierwiński said Thursday that police arrested the man for breaching security systems to gain access to company databases. A more detailed statement from the Krakow prosecutor’s office said the suspect allegedly hacked into an online retailer’s systems without authorization and manipulated its databases in ways that could have disrupted operations and endangered customers.

The suspect, whose identity has not been disclosed, illegally crossed into Poland in 2022 and obtained refugee status the following year. He has been placed in temporary custody while the investigation continues.

Authorities believe the man may be linked to additional cybercriminal activity targeting companies in Poland and across the EU, and are still assessing the scale of the possible damage.

Poland has repeatedly warned of heightened Russian intelligence activity since Moscow’s full-scale invasion of Ukraine. Prime Minister Donald Tusk said in July that 32 people — including Polish, Russian, Ukrainian, Belarusian and Colombian nationals — had been detained on suspicion of working with Russian services to carry out sabotage and arson attacks.

Earlier this year, Warsaw closed the Russian consulate in Krakow after linking Moscow’s intelligence services to a 2023 fire that destroyed a major shopping mall in Warsaw. Last week, Poland shut down the last remaining Russian consulate in the country after authorities said Russian intelligence was suspected of involvement in an explosion on a Polish railway line, which officials described as an act of sabotage.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Next Post

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Related Posts

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks targeting mobile users in Indonesia, Thailand, and Vietnam by impersonating government services. The activity, observed since October 2024, involves distributing modified banking applications that act as a conduit for Android malware, Group-IB said in a technical
Read More

Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware

Cybersecurity researchers have discovered an ongoing campaign that's targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat
Read More

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that's capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet. The extension, named Crypto Copilot, was first published by a user named "sjclark76" on May 7, 2024. The developer describes the browser add-on as
Read More