• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage

 | 

Taking over millions of developers exploiting an Open VSX Registry flaw

 | 

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber warfare
  • Hacking
  • Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Pierluigi Paganini February 27, 2022

Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.

Ukraine is recruiting a volunteer IT army of cyber security experts and white hat hackers to launch cyberattacks on a list of Russian entities. The list is composed of 31 targets including Russian critical infrastructure, government agencies, banks, hosting prividers.

Ukraine’s Minister for Digital Transformation Mykhaylo Fedorov called to action against Russia attempting to create an “IT Army” to launch a massive offensive against Russia.

We are creating an IT army. We need digital talents. All operational tasks will be given here: https://t.co/Ie4ESfxoSn. There will be tasks for everyone. We continue to fight on the cyber front. The first task is on the channel for cyber specialists.

— Mykhailo Fedorov (@FedorovMykhailo) February 26, 2022

A Telegram channel was used to coordinate the efforts and plan the cyber-attacks that will be conducted by the IT Army.

“We are creating an IT army. We need digital talents. All operational tasks will be given here: https://t.me/itarmyofurraine. There will be tasks for everyone. We continue to fight on the cyber front. The first task is on the channel for cyber specialists.” reads the message published by Fedorov.

Below the list of targets shared on Telegram:

“For all IT specialists from other countries, we translated tasks in English. 
Task # 1 We encourage you to use any vectors of cyber and DDoS attacks on these resources.  

Business corporations 

  • Gazprom – https://www.gazprom.ru/ 
  • Lukoil – https://lukoil.ru 
  • Magnet – https://magnit.ru/ 
  • Norilsk Nickel – https://www.nornickel.com/ 
  • Surgetneftegas – https://www.surgutneftegas.ru/ 
  • Tatneft – https://www.tatneft.ru/ 
  • Evraz – https://www.evraz.com/ru/ 
  • NLMK – https://nlmk.com/ 
  • Sibur Holing – https://www.sibur.ru/ 
  • Severstal – https://www.severstal.com/ 
  • Metalloinvest – https://www.metalloinvest.com/ 
  • NNC – https://nangs.org/ 
  • Russian Copper Company – https://rmk-group.ru/ru/ 
  • TMK – https://www.tmk-group.ru/ 
  • Yandex – https://ya.ru/ 
  • Polymetal International – https://www.polymetalinternational.com/ru/ 
  • Uralkali – https://www.uralkali.com/ru/ 
  • Eurosibenergo – https://www.eurosib.ru/ 
  • OMK – https://omk.ru/  
  • Banks Sberbank – https://www.sberbank.ru 
  • VTB – https://www.vtb.ru/ 
  • Gazprombank – https://www.gazprombank.ru/  

  • The state Public services – https://www.gosuslugi.ru/ 
  • Moscow State Services – https://www.mos.ru/uslugi/ 
  • President of the Russian Federation – http://kremlin.ru/ 
  • Government of the Russian Federation – http://government.ru/ 
  • Ministry of Defense – https://mil.ru/ 
  • Tax – https://www.nalog.gov.ru/ 
  • Customs – https://customs.gov.ru/ 
  • Pension Fund – https://pfr.gov.ru/ 
  • Roskomnadzor – https://rkn.gov.ru/

At this time the Kremlin, State Duma, and Ministry of Defense websites are still offline.

The operations that will be conducted by the IT army will increase the pressure on the Russian infrastructure already the target of a powerful operation launched by Anonymous.

A few hours after the Anonymous collective has called to action against Russia following the illegitimate invasion of Ukraine its members have taken down the website of the Russian propaganda station RT News, yesterday the group compromised the servers of the Russian Defense Ministry.

“Anonymous, a group of hacktivists, successfully hacked and leaked the database of the website of the Ministry of Defense of Russia.” reported the Pravda agency.

The website of the Kremlin (Kremlin.ru) was also unreachable, but it is unclear if it is the result of the Anonymous attack or if the government has taken offline it to prevent disruptive attacks.

The Russian Government’s portal, and the websites of other ministries were running very slow. 

The collective is also threatening the Russian Federation and private organizations of attacks, it is a retaliation against Putin’s tyranny.

Two days, Ukraine’s government started asking for volunteers from the hacker underground to provide their support in protecting critical infrastructure and carry out offensive operations against Russian state-sponsored hackers, reported Reuters which cited two e experts involved in the project.

The call for action against Russia was shared on hacker forums on Thursday morning.

“Ukrainian cybercommunity! It’s time to get involved in the cyber defense of our country,” reads the post published on the forum. “We have an army inside our country,” “We need to know what they are doing.”

Volunteers could submit an application via Google docs, detailing their professional cyber skills.

The post was written by Yegor Aushev, co-founder of the Ukrainian cybersecurity firm Cyber Unit Technologies. The cybersecurity expert told Reuters he wrote the post at the request of a senior Defense Ministry official who contacted him on Thursday.

“Aushev said the volunteers would be divided into defensive and offensive cyber units. The defensive unit would be employed to defend infrastructure such as power plants and water systems. In a 2015 cyberattack, widely attributed to Russia state hackers, 225,000 Ukrainians lost electricity.” reported the Reuters.

The offensive volunteer unit Aushev said he is organizing would help Ukraine’s military conduct digital espionage operations against invading Russian forces.

A lot of cyber experts are offering their support to Aushev’s initiative.

On the other side, some prominent ransomware gangs seem to be ready to provide their support to Russia. One of these gangs is the Conti ransomware gang, it published the following message on its leak site:

“As a response to Western warmongering and American threats to use cyber warfare against the citizens of Russian Federation, the Conti Team is officially announcing that we will use our full capacity to deliver retaliatory measures in case the Western warmongers attempt to target critical infrastructure in Russia or any Russian-speaking region of the world. We do not ally with any government and we condemn the ongoing war. However, since the West is known to wage its wars primarily by targeting civilians, we will use our resources in order to strike back if the well being and safety of peaceful citizens will be at stake due to American cyber aggression.”

The position of the cybercrime gang is clear.

Stay Tuned!

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, SIM swapping)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

Anonymous Hacking hacking news IT Information Security Pierluigi Paganini Russia Security Affairs Security News Ukraine

you might also like

Pierluigi Paganini June 28, 2025
LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage
Read more
Pierluigi Paganini June 27, 2025
Taking over millions of developers exploiting an Open VSX Registry flaw
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage

    Malware / June 28, 2025

    Taking over millions of developers exploiting an Open VSX Registry flaw

    Hacking / June 27, 2025

    OneClik APT campaign targets energy sector with stealthy backdoors

    Hacking / June 27, 2025

    APT42 impersonates cyber professionals to phish Israeli academics and journalists

    APT / June 27, 2025

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT