Copyright © 2024

The work of Euromaidan Press is supported by the International Renaissance Foundation

When referencing our materials, please include an active hyperlink to the Euromaidan Press material and a maximum 500-character extract of the story. To reprint anything longer, written permission must be acquired from [email protected].

Privacy and Cookie Policies.

Ukrainian hackers target Russia’s water supply company

The Ukrainian Blackjack hacker group launched a cyberattack against Rosvodokanal, Russia’s largest private water supply company, as “revenge for the attack on Kyivstar.”
Rosvodokanal building in Russia’s Omsk.
Ukrainian hackers target Russia’s water supply company

Ukrainian hackers, allegedly affiliated with the Security Service of Ukraine (SBU), have launched a significant cyber operation against Rosvodokanal, Russia’s largest private water supply company serving 7 million consumers, Liga media outlet reported, citing an undisclosed source.

The source described this operation as “revenge for the attack on Kyivstar.”

On the morning of 12 December, the largest Ukrainian telecommunications operator Kyivstar, and one of the country’s leading banks, Monobank, came under a hacker attack, which caused a technical failure and made mobile communications and Internet access unavailable.

On 20 December, the Blackjack hackers group orchestrated a powerful cyberattack, crippling the IT infrastructure of Rosvodokanal, Liga reported.

The source reveals that the company’s operations are currently disrupted. During the attack, hackers encrypted over 6,000 computers and deleted more than 50 TB of data, including internal documentation, corporate email, cybersecurity services, and backup copies. The SBU is now analyzing 1.5 TB of data extracted from Rosvodokanal, as per the sources.

In a related cyber offensive, the IT Army of Ukraine, on 20 December, claimed responsibility for a successful attack on the servers of the Russian cloud service Bitrix24, which is used by entities including the war sponsor Rosneft. This attack resulted in 40% of Bitrix24 users experiencing access issues to CRM systems and other services.

The IT Army of Ukraine published screenshots indicating malfunctions on the CIS servers, particularly in Russia, Belarus, and Kazakhstan, with disruptions observed in Moscow, St. Petersburg, Yekaterinburg, and other Russian cities.

Read also:

You could close this page. Or you could join our community and help us produce more materials like this.  We keep our reporting open and accessible to everyone because we believe in the power of free information. This is why our small, cost-effective team depends on the support of readers like you to bring deliver timely news, quality analysis, and on-the-ground reports about Russia's war against Ukraine and Ukraine's struggle to build a democratic society. A little bit goes a long way: for as little as the cost of one cup of coffee a month, you can help build bridges between Ukraine and the rest of the world, plus become a co-creator and vote for topics we should cover next. Become a patron or see other ways to support. Become a Patron!

To suggest a correction or clarification, write to us here

You can also highlight the text and press Ctrl + Enter

Please leave your suggestions or corrections here

    Euromaidan Press

    We are an independent media outlet that relies solely on advertising revenue to sustain itself. We do not endorse or promote any products or services for financial gain. Therefore, we kindly ask for your support by disabling your ad blocker. Your assistance helps us continue providing quality content. Thank you!

    Related Posts