29 February 2024

Ukrainian hacktivists share new details on production of Russian Orlan-10 drones


Ukrainian hacktivists share new details on production of Russian Orlan-10 drones

The Ukrainian hacktivist collective known as “Кіберспротив” (Cyber Resistance) team shared new details on how Russia procures foreign components for the production of weapons and equipment, bypassing Western sanctions. The data was obtained from hacked email correspondence from the Russian LLC “Special Technological Center.”

Note, the first part of the CYBINT investigation was published on the InformNapalm community website in January 2024. The investigation highlighted how Russian sanctioned companies circumvent Western sanctions and obtain foreign equipment, spare parts, and components.

Three days after the publication, the German company Rohde & Schwarz, whose products are constantly mentioned in the documentation of the “STC” and which are crucial for Russia’s production of the electronic warfare equipment, made a public statement promising to review its own business processes to identify critical problems related to the sale of their products by intermediaries that end up in Russian production facilities.

According to InformNapalm, the hackers were able to gain access to the email account of the procurement manager for the Research and Development Department of the Special Technological Center, Andrey Florinsky.

The obtained data indicates that Russian companies are increasingly purchasing equipment through China and using Chinese currency. The scheme operates in such a way that all parties involved in circumventing sanctions understand and act “for results.” Contractors understand that they are involved in purchasing foreign goods bypassing sanctions, as do those who sell to them. It is worth noting that most Russian intermediaries do not even conceal the fact that they are procuring goods from China, InformNapalm says.

Some proposals were also made in euros. Notably, the documents included details about the projects for which not only Chinese parts but also Swiss parts were noticed. For instance, the Swedish company AXIS, a manufacturer of video cameras used on Orlan-10 reconnaissance drones, was frequently mentioned in the documents.

In fact, a large number of “middlemen” companies cooperate with the Russian military production manufacturer “STC.” Only one of them, “ELPROM” is currently under sanctions.

“But it is worth understanding that middleman companies are created quite quickly and take advantage of the imperfections of sanction mechanisms. Therefore, as long as the sanctions do not become stricter, this flow will not stop,” InformNapalm said.

The analysis of the data also revealed documents that contain recommendations on how contractors should proceed to make foreign currency payments abroad. Firstly, they should open appropriate accounts with PJSC Promsvyazbank, closely associated with the defense industry sector of the Russian Federation. Also, there is an explanation of how to interact with foreign contractors.

At the beginning of February, a group of hackers known as PRANA Network hacked the email servers of the Iranian company Sahara Thunder linked to the Islamic Revolutionary Guard Corps (IRGC), which facilitates the illegal sale of weapons from Iran to Russia.

The hackers extracted nearly 10 GB of files from the company, including contracts detailing multi-million-dollar arms deals, evidence of payments made in gold bars, blueprints for unmanned aerial vehicles (UAVs), and details regarding an operative known as Generation Trading FZE based in the United Arab Emirates (UAE), a company called Alabuga.


Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024