SHARE
Facebook X Pinterest WhatsApp

Russian Hackers Target Western Firms Aiding Ukraine, Spy on Shipments

Russian military hackers are targeting Western firms aiding Ukraine, using cyberespionage to infiltrate logistics networks and spy on arms shipments.

May 23, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Western governments are raising a red flag over a growing Russian cyber threat.

In a joint cybersecurity advisory, intelligence and cybersecurity agencies from the United States, the United Kingdom, Germany, France, Poland, and more than a dozen other allied nations have warned that a Russian military cyber unit is behind an aggressive campaign targeting logistics and technology companies that help Ukraine.

The advisory, issued this week, points directly at the Russian General Staff Main Intelligence Directorate (GRU) unit 26165, also known in the cybersecurity world as APT28, Fancy Bear, and Forest Blizzard.

“This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide-scale targeting of IP cameras in Ukraine and bordering NATO nations,” the advisory stated.

Who’s being targeted?

Since Russia’s invasion of Ukraine began in 2022, the hackers linked to one of the GRU’s most notorious divisions have allegedly expanded their operations to attack critical parts of the supply chain supporting Ukraine. The hackers have gone after:

  • Defense contractors.
  • Transport hubs like airports and ports.
  • Air traffic control systems.
  • Maritime operators.
  • IT service providers.

The affected countries include the United States, Germany, Poland, France, Romania, Ukraine, the Netherlands, the Czech Republic, Slovakia, Greece, Bulgaria, Moldova, and Italy.

The joint report reveals that the attackers not only infiltrate the main target company but also go after partners and connected firms, abusing trust relationships to spread deeper.

In one case, the hackers stole credentials giving access to “sensitive information on shipments, such as train schedules and shipping manifests,” the advisory notes.

How they’re getting in

The Russian hackers rely on a mix of old and new tactics to break in, including:

  • Credential guessing and brute-force attacks.
  • Spearphishing emails with fake login pages impersonating Western email platforms.
  • Malware, including variants like HEADLACE and MASEPIE.
  • Exploiting known software vulnerabilities like:
    • Microsoft Outlook (CVE-2023-23397).
    • WinRAR (CVE-2023-38831).
    • Roundcube webmail bugs.

The group also leverages tools like Tor and commercial VPNs to hide their tracks and rotate IP addresses frequently.

IP cameras as spy tools

One of the more chilling revelations is that the Russian hackers also targeted internet-connected cameras, particularly those near border crossings and railway stations in Ukraine.

Using default passwords and hacking tricks, the attackers tried to access live feeds to monitor shipments of weapons and supplies.

According to the advisory, 81% of these attempts were aimed at Ukrainian cameras, followed by Romania (9.9%), Poland (4.0%), Hungary (2.8%), and Slovakia (1.7%).

What can be done?

Authorities believe that the threat is far from over. They say the campaign will likely continue as long as Western countries support Ukraine.

The advisory outlines steps to defend against GRU’s tactics. These include:

  • Enforcing multi-factor authentication.
  • Applying security patches and updating software regularly.
  • Monitoring networks for anomalous activity.
  • Segregating sensitive systems with Zero Trust principles.
  • For IP cameras, disable unnecessary remote access and use VPNs for secure viewing.

As Western aid remains critical to Ukraine’s defense, Russia’s cyber operations aim to disrupt supply chains and gather intelligence. 

Behind every truck, plane, or ship carrying aid to Ukraine, there’s now a digital battlefield, where hackers lurk, watching, probing, and trying to intercept help before it arrives.

AA

Aminu Abdullahi is an experienced B2B technology and finance writer. He has written for various publications, including TechRepublic, eWEEK, Enterprise Networking Planet, eSecurity Planet, CIO Insight, Enterprise Storage Forum, IT Business Edge, Webopedia, Software Pundit, Geekflare and more.

Recommended for you...

Google Data Breach Sparks Phishing Wave Targeting Gmail Users
Aminu Abdullahi
Aug 27, 2025
Google Cloud Unveils AI Ally to Boost Security Defenses
Aminu Abdullahi
Aug 21, 2025
ClickFix Phishing Attacks Surge Nearly 400% in Just One Year
Matt Gonzales
Aug 19, 2025
AI Agents Vulnerable to ‘Silent Hijacking,’ Security Researchers Warn
Aminu Abdullahi
Aug 15, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.