Ukraine thwarts Sandworm attack targeting military systems

Ukraine thwarts Sandworm attack targeting military systems

Ukraine’s security services have foiled an attempt by Russian state-backed hackers to compromise the combat data exchange system of the Armed Forces of Ukraine.

The Security Service of Ukraine (SSU) has attributed the attacks to Sandworm, a threat actor linked to military unit 74455, a cyberespionage unit of Russia's military intelligence service.

The group is believed to be behind the December 2015 Ukraine power grid cyberattack, the 2017 cyberattacks on Ukraine using the NotPetya malware, various interference efforts in the 2017 French presidential election, and the cyberattack on the 2018 Winter Olympics opening ceremony. Since the beginning of Russia’s invasion of Ukraine in February 2022, the team has launched multiple attacks against Ukrainian entities using destructive malware and ransomware.

According to a technical report released by the SSU, in the recent attacks, the group attempted to infect Ukraine’s military network with nearly ten variants of custom malware ranging from Android remote access trojans and Mirai variants to backdoors designed to collect data from Ukraine's Starlink satellite connections. The agency noted that Russia’s preparation for this attack was “long and thorough.”

The goal of the operation was to gather intelligence on the Ukrainian military's operations, technical provisions and movements. This was intended to achieve by capturing tablets used by the Ukrainian military on the battlefield. Through these tablets the threat actor wanted to gain access to other connected devices and infect them with malware.

Last week, the Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new information-stealing campaign targeting Ukraine’s government entities with the MerlinAgent malware.


Back to the list

Latest Posts

Cyber Security Week in Review: April 4, 2025

Cyber Security Week in Review: April 4, 2025

In brief: New Ivanti zero-day exploited by Chinese hackers, police shut down the Kidflix CSAM platform, and more.
4 April 2025
UAC-0219 targets Ukraine’s government agencies with WRECKSTEEL stealer

UAC-0219 targets Ukraine’s government agencies with WRECKSTEEL stealer

This activity has been ongoing since at least the fall of 2024.
3 April 2025
Police crackdown shuts down major Kidflix platform hosting child sexual abuse material

Police crackdown shuts down major Kidflix platform hosting child sexual abuse material

As a result of the operation, 79 arrests were made, 1,393 suspects identified, and over 3,000 electronic devices seized.
2 April 2025