Ukraine’s security service (SBU) announced the arrest of a suspected member of the pro-Kremlin hacker group, the Cyber Army of Russia, in the northeastern city of Kharkiv.
The individual, a tech specialist, was reportedly recruited through a Telegram hacker channel by Russian intelligence. During a search of his apartment, Ukrainian law enforcement confiscated various electronic devices, including mobile phones, a laptop, and flash drives, which are believed to contain evidence of his involvement in cybercrimes against Ukraine.
The suspect is accused of conducting distributed denial-of-service (DDoS) attacks on Ukrainian state websites and leaking strategic military information, such as the locations of Ukrainian troops, artillery, and air defense systems, to Russian forces.
This intelligence allegedly facilitated missile strikes by Russia on Ukrainian civil infrastructure, including a hospital. The hacker could face up to 12 years in prison if convicted.
The detention of Ukrainian citizens for aiding Russian intelligence with spying and targeting local infrastructure has become a frequent occurrence in the ongoing war. These individuals typically capture and send photos or videos of Ukrainian military locations to Russia via Telegram. In one notable case from October, the SBU detained a Ukrainian man who had installed cameras to monitor the movements of Ukrainian military equipment and personnel, and relayed this information to Russian intelligence. While the apprehension of hackers in Ukraine is relatively rare, there have been similar instances in Russia.
In October, two Russian citizens were detained in Siberia for alleged cyberattacks against Russian networks on behalf of Ukraine, facing up to 20 years in prison on treason charges. Last year, three individuals from Rostov-on-Don were either imprisoned or fined for launching DDoS attacks against Russian websites.
Reference: