Russia jails hacker for two years over cyberattack on local tech company

Avatar

A Russian citizen has been sentenced to two years in a penal colony for launching a distributed denial-of-service (DDoS) attack against a local tech company.

The man, a resident of the Rostov region, was convicted for organizing a paid DDoS attack in April 2024 against a company classified as part of Russia’s critical information infrastructure, according to a statement from the Federal Security Service (FSB). In addition to the prison sentence, he was fined 500,000 rubles (approximately $5,400).

The Russian agency didn’t specify who paid the suspect for the attack, but in previous cases it has blamed Ukrainian intelligence agencies for recruiting Russian citizens to carry out sabotage, espionage and cyber campaigns inside the country.

Russian security agencies have increasingly reported cases involving local hackers allegedly working against the state or cooperating with foreign entities.

In October, the FSB detained a 61-year-old Moscow resident accused of using Ukrainian-made software to conduct DDoS attacks during regional elections. Authorities said the attacks disrupted infrastructure in Moscow and its surrounding areas.

A month earlier, investigators opened a treason case against a Moscow-based scientist alleged to have collaborated with Ukraine’s intelligence services to carry out cyberattacks. If convicted, he could face a life sentence.

Russian law enforcement also arrested a tech student last October for allegedly aiding the Ukrainian hacker group known as Cyber Anarchy Squad. In a separate case, a 49-year-old man was charged in February for causing a regional blackout through a cyberattack on a power plant.

Despite this uptick in domestic cybercrime prosecutions, legal proceedings against major Russian-linked hacking groups have progressed more slowly.

The trial of several alleged members of REvil — a ransomware group blamed for high-profile attacks abroad — has dragged on for over two years. Of the 14 people originally detained, only eight have appeared in court, facing charges of illegal financial transactions. During a hearing this week, some defendants pleaded guilty while others maintained their innocence.

Meanwhile, the Russian government has pushed back against international efforts to target Russian hacking groups. After the U.S. sanctioned members of the pro-Kremlin Cyber Army of Russia Reborn (CARR), Moscow dismissed the move as part of a Western “propaganda campaign.”

CybercrimeGovernmentNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Texas city warns thousands of utility payment site breach

Next Post

Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering

Related Posts

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February 10, 2025, as part of iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, watchOS 11.3.1,
Avatar
Read More

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isn’t
Avatar
Read More

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. "Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and
Avatar
Read More