Russia arrests hacker accused of preventing electronic voting during local election

Avatar

Russia’s Federal Security Service (FSB) announced that it had detained a Moscow resident for conducting distributed denial-of-service (DDoS) attacks during local elections in September, targeting infrastructure in the capital and the Moscow region.

According to the agency’s press service, the 61-year-old suspect used Ukraine-made software to carry out the DDoS attacks on Russia’s critical information infrastructure. His activity coincided with the regional parliamentary and municipal elections.

The FSB reported that the hacker had installed Ukrainian software on his personal device and attacked, among others, the IP addresses of an internet provider in the Moscow region. The attack disrupted the provider’s systems, “preventing the company from providing internet access to customers and hindering voters from participating in remote electronic voting,” the agency said.

Russian law enforcement said they are currently working to identify the suspect’s accomplices. If convicted, he could face up to five years in prison or be sentenced to forced labor, according to Russia’s criminal code.

The FSB has not disclosed which Ukrainian software the suspect used or whether he was affiliated with any hacker group. Since Russia’s invasion of Ukraine more than two years ago, many pro-Ukraine hackers have developed their own DDoS toolkits, which they offer for free to anyone willing to target Russia. The attacks work by flooding targeted systems with junk traffic to make them temporarily unreachable.

Along with the software, these hackers often provide detailed instructions — or even video lessons — making it easy for people without coding skills to join the digital fight.

Although it’s unclear if the suspect has ties to Ukraine, it would not be the first time Russia has prosecuted its own citizens for aiding that country. In August, the FSB opened a criminal case against a Moscow-based scientist accused of carrying out DDoS attacks on behalf of Ukraine’s intelligence agency. He was charged with treason and faces the possibility of a life sentence if convicted.

Last October, Russian law enforcement arrested a local tech student who allegedly assisted the Ukrainian hacker group known as the Cyber Anarchy Squad in launching cyberattacks against Russia.

In February, a 49-year-old Russian national was charged with launching a cyberattack on a local power plant, causing a blackout in dozens of settlements. Last year, three residents of Rostov-on-Don were sentenced to prison or fined for carrying out DDoS attacks against Russian websites.

Ukraine is also prosecuting individuals accused of aiding Russia. However, most Ukrainian reports focus on local citizens suspected of spreading Russian disinformation or helping the Russian military locate Ukrainian forces and assess damage to critical infrastructure caused by missile strikes.

CybercrimeElectionsGovernmentNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

US names and charges Maxim Rudometov with developing the Redline infostealer

Next Post

North Korean hackers seen collaborating with Play ransomware group, researchers say

Related Posts

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a three-month period from late 2024 through the beginning of 2025. The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 (aka Kimsuky), TA450 (aka MuddyWater),
Avatar
Read More

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance, generate sophisticated phishing lures, and exploit vulnerabilities before security teams can react. Meanwhile, defenders are overwhelmed by massive amounts of data and alerts, struggling to process information quickly enough to identify real threats. AI offers a way to
Avatar
Read More

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method by default. "Brand new Microsoft accounts will now be 'passwordless by default,'" Microsoft's Joy Chik and Vasu Jakkal said. "New users will have several passwordless options for
Avatar
Read More