Russia Targeting, Breaching Western Organizations Aiding Ukraine: CISA Joint Advisory

Organizations from 13 nations have been targeted, including those in the United States, Germany, and France.
Russia Targeting, Breaching Western Organizations Aiding Ukraine: CISA Joint Advisory
In this photo illustration, a hacker types on a computer keyboard on May 13, 2025. Anna Varavva/The Epoch Times
Naveen Athrappully
Updated:
0:00
Western logistics and technology companies engaged in the transportation, coordination, and delivery of foreign assistance to Ukraine are being targeted by a Russian state-sponsored cyber unit, the Cybersecurity and Infrastructure Security Agency (CISA) said in a May 21 advisory jointly issued with multiple global agencies.

The campaign, which began in 2022, is being carried out by a military unit within the Russian General Staff Main Intelligence Directorate (GRU) called Unit 26165, which is known in the cybersecurity community under various names such as APT28, Fancy Bear, Forest Blizzard, and BlueDelta.

Government organizations and commercial entities have been targeted in the campaign. Affected sectors include the defense industry, IT services, air traffic management, maritime entities, and transportation hubs such as airports and shipping ports.

The entities targeted by unit 26165 were located in 13 nations—Ukraine, the United States, Bulgaria, the Czech Republic, France, Germany, Greece, Italy, Moldova, Netherlands, Poland, Romania, and Slovakia.

Unit 26165 has been able to gain access to systems of multiple organizations. After gaining entry into a target’s systems, the threat actor sought access to accounts holding sensitive information regarding shipments such as manifests and train schedules, according to the advisory.

The accounts contained details on aid shipments to Ukraine, including sender, recipient, cargo contents, travel route, destination, and container registration numbers.

Unit 26165 also likely gained access to private cameras of targets at key locations, including military installations, border crossings, and rail stations, the advisory stated, adding that the threat actor hacked municipal service portals to access traffic cams.

Over 80 percent of targeted cameras were located in Ukraine, with the remaining cameras in Romania, Poland, Hungary, Slovakia, and other places.

“Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting,” the advisory said, asking them to increase monitoring and prepare their network defenses, assuming that they would be targeted.

The joint advisory was issued by 21 global agencies from multiple nations, including the United States, France, the United Kingdom, and Germany.

In a May 21 statement, Paul Chichester, the director of operations at the UK’s National Cyber Security Centre, an agency involved in issuing the advisory, said the “malicious campaign by Russia’s military intelligence service presents a serious risk to targeted organizations.”

“We strongly encourage organizations to familiarise themselves with the threat and mitigation advice included in the advisory to help defend their networks.”

Last month, French authorities accused Russia’s GRU of engaging in a series of hacking operations.

The GRU “has been deploying a cyber-offensive modus operandi called APT28 against France for several years. It has targeted around 10 French entities since 2021,” Jean-Noel Barrot, the French foreign minister, wrote on the social media platform X on April 30.

The attack procedure has been used to target or compromise a dozen French entities since 2021, France’s Ministry for Europe and Foreign Affairs said in a statement.

Russian Cyber Threat

According to the March 2025 Annual Threat Assessment report issued by the Office of the Director of National Intelligence, Russia has demonstrated “real-world disruptive capabilities” on the cyber front over the last decade.

This includes gaining experience in attack execution through relentless targeting of Ukraine’s networks with malware.

Russia has had “repeated success compromising sensitive targets for intelligence collection,” the report said.

The country’s advanced cyber capabilities and past attempts at pre-positioning itself to access critical U.S. infrastructure “make it a persistent counterintelligence and cyber attack threat.”

“Moscow’s unique strength is the practical experience it has gained integrating cyber attacks and operations with wartime military action, almost certainly amplifying its potential to focus combined impact on U.S. targets in time of conflict.”

Over the past year, Washington has taken several actions as part of its crackdown against Russian cyber threats.

In July, the Treasury sanctioned two Russian hackers who allegedly engaged in cyber attacks against America’s critical infrastructure. One of the individuals was allegedly behind the compromise of a control system at an energy company.
The Department of Justice and Microsoft also seized over 100 web domains with alleged ties to a cyberespionage campaign run by the Russian government, according to court documents unsealed on Oct. 3, 2024.

The domains were used by hackers working for the Callisto Group, an operational unit of the Russian Federal Security Service, the successor of the KGB.