Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

Posted on July 5, 2025July 5, 2025 By CWS

Russian Federal Safety Service (FSB) officers have detained two hackers in Siberia who performed cyberattacks on crucial infrastructure services beneath direct orders from Ukrainian intelligence companies.

The simultaneous arrests within the Kemerovo and Tomsk areas uncovered a classy cyber espionage community concentrating on Russia’s governmental, industrial, and monetary info programs.

The first suspect, a 36-year-old resident of Kemerovo, utilized encrypted messenger communications to coordinate along with his Ukrainian handlers as a part of an organized cyber unit.

FSB investigators found intensive technical gear and malicious software program arsenals throughout searches of his residence, revealing the dimensions of the operation concentrating on Russia’s crucial infrastructure networks.

The malware deployment technique targeted on disrupting important companies throughout a number of sectors. Authorities businesses, industrial enterprises, and monetary organizations turned main targets via coordinated assaults designed to destabilize nationwide operations.

Even momentary incapacitation of those info sources created cascading results all through Russia’s financial and administrative programs.

Vesti analysts recognized the assault methodology as a deliberate marketing campaign to compromise delicate infrastructure via persistent malware infiltration.

The hackers employed refined methods to take care of extended entry to focus on networks, enabling sustained knowledge exfiltration and system disruption capabilities.

Technical Evaluation of the Malware Infrastructure

The investigation revealed that the risk actors utilized a multi-stage an infection mechanism incorporating messenger-based command and management communications.

The malware exhibited superior persistence ways, possible using registry modifications and scheduled activity creation to take care of system entry.

Detection evasion methods included course of hollowing and reminiscence injection strategies to keep away from conventional antivirus signatures.

# Instance of potential persistence mechanism
import os
import subprocess

def establish_persistence():
task_name = “SystemUpdateCheck”
executable_path = “C:Home windowsSystem32svchost.exe”
subprocess.run([‘schtasks’, ‘/create’, ‘/tn’, task_name,
‘/tr’, executable_path, ‘/sc’, ‘onstart’])

The malware structure suggests refined risk actors with substantial sources and technical experience.

Former FSB official Alexander Belyaev famous that Ukrainian intelligence companies exploit people via monetary incentives or ideological manipulation, making a recruitment pipeline for cyber operations.

Each hackers now face excessive treason prices carrying potential 20-year jail sentences.

The case underscores the escalating cyber warfare dimension of the continued battle, the place digital battlefields prolong far past conventional army engagements into civilian infrastructure vulnerabilities.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Critical, Cyberattacks, Hacker, Infrastructure, Intelligence, Jailed, Launch, Russia, Ukrainian, Worked

Post navigation

Previous Post: Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
Next Post: “CitrixBleed 2” Vulnerability PoC Released

Related Posts

Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware Cyber Security News
Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
New Frontiers In Identity-Based Access Control Cyber Security News
UK Retailer Co-op Confirms 6.5 Million Members’ Data Stolen in Massive Cyberattacks Cyber Security News
Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
  • Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
  • Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News