Russia arrests hacker accused of preventing electronic voting during local election

Avatar

Russia’s Federal Security Service (FSB) announced that it had detained a Moscow resident for conducting distributed denial-of-service (DDoS) attacks during local elections in September, targeting infrastructure in the capital and the Moscow region.

According to the agency’s press service, the 61-year-old suspect used Ukraine-made software to carry out the DDoS attacks on Russia’s critical information infrastructure. His activity coincided with the regional parliamentary and municipal elections.

The FSB reported that the hacker had installed Ukrainian software on his personal device and attacked, among others, the IP addresses of an internet provider in the Moscow region. The attack disrupted the provider’s systems, “preventing the company from providing internet access to customers and hindering voters from participating in remote electronic voting,” the agency said.

Russian law enforcement said they are currently working to identify the suspect’s accomplices. If convicted, he could face up to five years in prison or be sentenced to forced labor, according to Russia’s criminal code.

The FSB has not disclosed which Ukrainian software the suspect used or whether he was affiliated with any hacker group. Since Russia’s invasion of Ukraine more than two years ago, many pro-Ukraine hackers have developed their own DDoS toolkits, which they offer for free to anyone willing to target Russia. The attacks work by flooding targeted systems with junk traffic to make them temporarily unreachable.

Along with the software, these hackers often provide detailed instructions — or even video lessons — making it easy for people without coding skills to join the digital fight.

Although it’s unclear if the suspect has ties to Ukraine, it would not be the first time Russia has prosecuted its own citizens for aiding that country. In August, the FSB opened a criminal case against a Moscow-based scientist accused of carrying out DDoS attacks on behalf of Ukraine’s intelligence agency. He was charged with treason and faces the possibility of a life sentence if convicted.

Last October, Russian law enforcement arrested a local tech student who allegedly assisted the Ukrainian hacker group known as the Cyber Anarchy Squad in launching cyberattacks against Russia.

In February, a 49-year-old Russian national was charged with launching a cyberattack on a local power plant, causing a blackout in dozens of settlements. Last year, three residents of Rostov-on-Don were sentenced to prison or fined for carrying out DDoS attacks against Russian websites.

Ukraine is also prosecuting individuals accused of aiding Russia. However, most Ukrainian reports focus on local citizens suspected of spreading Russian disinformation or helping the Russian military locate Ukrainian forces and assess damage to critical infrastructure caused by missile strikes.

CybercrimeElectionsGovernmentNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

US names and charges Maxim Rudometov with developing the Redline infostealer

Next Post

North Korean hackers seen collaborating with Play ransomware group, researchers say

Related Posts

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week. "This
Avatar
Read More

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,
Avatar
Read More