Ransomware gangs advancing Moscow’s geopolitical aims, Romanian cyber chief warns

KYIV, Ukraine — Recent ransomware attacks targeting Romania’s critical infrastructure were likely part of a broader Russian hybrid operation aimed at undermining the country’s stability, Romania’s top cybersecurity official said.

Over the past several months, Romania has faced a series of large-scale ransomware incidents affecting key sectors, including the national water agency and energy providers.

Some of the attacks were claimed by or attributed to Russian-speaking ransomware groups, including Qilin and Gentlemen, which said they targeted Romania’s national oil pipeline operator and the country’s largest coal-based power producer.

While ransomware attacks are typically viewed as profit-driven criminal activity, Romanian authorities say the recent campaigns appear to align with broader Russian strategic interests.

“These attacks are systematic, well-prepared and often coincide with political decisions or social developments in Romania, particularly those linked to support for Ukraine,” Dan Cimpean, head of Romania’s National Cybersecurity Directorate, said on the sidelines of the Kyiv International Cyber Resilience Forum last week.

Cimpean said roughly 80% of cyber incidents detected in Romania are linked to criminal actors, many of whom he described as being backed by Russia.

“It’s in Russia’s interests to encourage those groups and make sure they are stronger and have financial autonomy,” he said. “That’s why they are asking for money and collecting ransoms.”

Romania does not have legislation explicitly banning private companies from paying ransom demands, though authorities strongly discourage such payments. For state-owned companies and government agencies, ransom payments are effectively impossible because such expenses cannot be legally justified, Cimpean said.

“We don’t negotiate with cyber terrorists,” he told Recorded Future News, adding that payments do not guarantee the recovery of stolen or encrypted data.

State-sponsored hacking groups are also active in Romania, Cimpean said, though he added their activity currently focuses more on maintaining access rather than conducting disruptive attacks.

Romania’s strategic position as a NATO and European Union member, with access to the Black Sea and strong support for Ukraine and Moldova, makes it a particularly attractive target for Russian hybrid operations.

During last week’s cyber forum in Kyiv, Ukraine, Moldova and Romania signed a memorandum aimed at strengthening regional cooperation against Russian cyber threats.

“Russia is trying to destabilize our social, political and economic life, undermine infrastructure and test our ability to respond every single day,” Cimpean said.

He added that Russian cyber activity could intensify even if fighting in Ukraine were to ease.

“The moment kinetic activities stop, Russia will definitely continue to operate in cyberspace, and we have to be prepared,” he said.

Romania is not alone in facing cyber pressure from Moscow-aligned actors. Polish authorities recently attributed a cyberattack targeting parts of the country’s energy infrastructure to Moscow-linked actors, while Moldovan officials have warned that Russia combined cyber and information operations to influence parliamentary elections earlier this year.

Dutch intelligence agencies also warned this month that Russia is intensifying cyberattacks, sabotage and covert influence campaigns across Europe, signaling a prolonged confrontation with the West.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

How Exposed Endpoints Increase Risk Across LLM Infrastructure

Next Post

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Related Posts

⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Last week’s cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust every day behave in unexpected ways. Old flaws resurfaced. New ones were used almost immediately. A common theme ran through it all in 2025. Attackers moved faster than fixes. Access meant for work, updates, or support kept getting abused. And damage did not
Read More

New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control

A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a "full spectrum" of features to facilitate on-device fraud (ODF), screen manipulation, and real-time interaction with infected devices. The malware embeds a hard-coded list comprising over 400 applications spanning banking, financial technology, payment processors, cryptocurrency
Read More

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Security experts have disclosed details of an active malware campaign that's exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers. "Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate ahost.exe (
Read More