Russia used Belarus’s cell towers to bomb Ukrainian power plants. Then hackers got inside the operators’ chatrooms

For six months, Ukrainian IT specialists watched Russian drone operators plan routes in real time — tracking launch orders and flight paths, feeding everything to Ukraine’s defense forces.
russia used belarus's cell towers bomb ukrainian power plants hackers got inside operators' chatrooms · post russian geran-2 (shahed-136) drone belarusian markings service military belta militarnyi російський безпілотник герань 2
Russian Geran-2 (Shahed-136) drone with Belarusian markings in service with the Belarusian military. Photo: BelTA via Militarnyi.
Russia used Belarus’s cell towers to bomb Ukrainian power plants. Then hackers got inside the operators’ chatrooms

Ukrainian hackers infiltrated Russian drone operator systems for six months, exposing how Russia weaponized Belarusian civilian infrastructure to strike Ukraine and test attack routes into NATO countries, InformNapalm reported on 20 February. 

The findings contributed to President Zelenskyy's 18 February decision to impose personal sanctions on Belarusian dictator Aliaksandr Likashenka, InformNapalm says. The operation also revealed that Russia's September 2025 drone incursion into Poland was a deliberate test of Belarusian cellular infrastructure, with the ultimate goal of planning strikes to cut Western weapons supplies. 

Since Russia started its full-scale invasion of Ukraine in 2022, Belarus has been Moscow's closest ally in the war, having let Russian forces cross its territory toward Kyiv at the invasion's outset and continuing to provide matériel support and training ever since.

Hackers broke into dozens of Russian military accounts

The cyber operation was carried out by hackers from the Fenix analytical cyber center with support from InformNapalm volunteers. The team broke into accounts of dozens of Russian military personnel and gained access to monitoring systems used by attack drone operators, InformNapalm says. They organized round-the-clock covert surveillance, carefully hiding their presence.

The hackers could not control the drones. But they could watch every move — flight paths, flight missions, and internal chats. They promptly passed all data to Ukraine's defense forces, helping intercept Russian drones more effectively. The operation ran from at least mid-2025 through February 2026, when it exhausted its intelligence potential — partly because of Ukraine's own successful strikes that the surveillance had enabled.

Screenshot of Russian drone operators' desktop showing drone camera feed. In the chat, operator user5214 writes: "Drone ЫЫ12057 normal takeoff at 11:08 in the direction of Chernihiv." 25 September 2025. Source: InformNapalm

 

Belarus's cell towers turned into drone highways

Analysis of intercepted chats revealed Russia was using Belarusian civilian cell towers to route strike drones, providing stable signal along the border and extending strike range range to targets near northern and western Ukraine's borders. Russia also deployed signal repeaters on Belarusian territory in the second half of 2025, reaching targets from Kyiv Oblast to Volyn. Some attacks on energy and railway infrastructure would not have been possible without this assistance, Zelenskyy noted when announcing the sanctions.

Screenshot of Russian drone operators' route planning software showing typical flight paths from Russian territory along Belarus's internal border toward Ukraine. Source: InformNapalm

Surveillance enabled strikes on Russia's elite Rubikon unit

According to InformNapalm, Ukraine's defense forces used the intelligence for strikes on command posts and drone launch sites in Russian territory and occupied areas. The data also enabled strikes on positions of the elite Rubikon drone unit — a formation established in August 2024 and widely considered one of Russia's most effective battlefield units.

Poland drone incursion was a deliberate test, hacked chats show

One of the operation's most significant findings concerned the September 2025 drone incursion into Poland. Overnight on 9-10 September, at least 19 Russian drones entered Polish airspace, triggering NATO's first live-fire response since the full-scale invasion began. Russia claimed the drones simply strayed during strikes on Ukraine.

 

A Starlink satellite terminal set up in a Ukrainian wheat field. Illustrative image shared by Digital Minister Mykhailo Fedorov via Telegram
Explore further

InformNapalm says the hacked chats tell a different story. Ukrainian hackers passed intelligence to NATO partners as early as September 2025, showing the incursion was a test of Belarusian cellular infrastructure capabilitiesRussia's goal was to plan future strikes on logistics routes in both Ukraine and Poland — to cut Western weapons deliveries.

Physical evidence corroborates the findings. Russian operators' software and chats contained data about YY-series drones. Gerbera decoy drones with serial numbers YY32384 and YY31402 were later found in Poland. A tail fragment of YY31704 washed up on a beach in Latvia.

russian gerbera drone wreckage washes onto latvian beach after drifting sea tail section styrofoam bearing serial number starting cyrillic letters ыы washed ashore latvia’s ventspils district latvia fragment military up
Tail section of a Russian styrofoam Gerbera drone bearing a serial number starting with Cyrillic letters ЫЫ, washed ashore in Latvia’s Ventspils district. Photo: X/@Latvijas_armija

Sanctions on Likashenka and the stalled Cyber Forces bill

Zelenskyy announced the sanctions on 18 February, accusing Likashenka of "trading Belarus's sovereignty for the continuation of his personal power." Beyond drone relays, he pointed to over 3,000 Belarusian enterprises supplying Russia's military and ongoing construction of Oreshnik missile infrastructure in Belarus.

The operation's success also highlights a persistent gap. Ukrainian cyber specialists conducting offensive operations still lack a formal legal status. A bill to create Cyber Forces — draft No. 12349 — passed its first reading on 9 October 2025 but has stalled since. On 19 February, InformNapalm spokesperson Mykhailo Makaruk publicly noted the delay. 

A recent successful operation against Russia's attempts to bypass Starlink blocking demonstrated the potential of civilian-military cyber cooperation — but InformNapalm argues the potential is far greater with proper institutional backing.

To suggest a correction or clarification, write to us here

You can also highlight the text and press Ctrl + Enter

Please leave your suggestions or corrections here



    Euromaidan Press

    We are an independent media outlet that relies solely on advertising revenue to sustain itself. We do not endorse or promote any products or services for financial gain. Therefore, we kindly ask for your support by disabling your ad blocker. Your assistance helps us continue providing quality content. Thank you!

    Ads are disabled for Euromaidan patrons.

    Support us on Patreon for an ad-free experience.

    Already with us on Patreon?

    Enter the code you received on Patreon or by email to disable ads for 6 months

    Invalid code. Please try again

    Code successfully activated

    Ads will be hidden for 6 months.