Skip to content
Cybersecurity | | | 7 min read

Russia-Ukraine Conflict and Cybercrime - How the War Changed Cyber Threats

How the Russia-Ukraine war transformed the cybercrime ecosystem - attacks on critical infrastructure, hacktivism, FrostyGoop, Sandworm, and implications for Europe.

Eugene Wypior Eugene Wypior
Józef Sulwiński Józef Sulwiński
cyberwojnaRosjaUkrainaSandworminfrastruktura krytycznahaktywizm
Russia-Ukraine Conflict and Cybercrime - How the War Changed Cyber Threats

In January 2024, residents of over 600 buildings in Lviv lost heating in the middle of winter. The cause was not a technical failure - the FrostyGoop malware sent crafted Modbus TCP commands to ENCO controllers, forcing incorrect readings and shutting down district heating systems. This is the first known case of the Modbus protocol being used for direct sabotage of heating systems in combat conditions.

This incident illustrates how the Russia-Ukraine conflict has fundamentally changed the nature of cyber operations - from espionage and data theft to physical impact on civilian life.

4 315

cyber incidents reported by CERT-UA in 2024

+70%

year-over-year increase in attacks

3 018

incidents in H1 2025

125k

members of IT Army of Ukraine

Source: CERT-UA, Keepnet Labs 2026

Three phases of cyber operations in the conflict

Cyber operations in the Russia-Ukraine war have undergone a clear evolution since the beginning of the conflict in 2014.

PhasePeriodNatureExample
Preparatory2014-2021Espionage, tool testing, infrastructure reconnaissanceBlackEnergy - attack on Ukraine’s power grid (2015)
Kinetic2022-2023Wipers, data destruction, coordination with military operationsIndustroyer2 - attempt to shut down power substations (2022)
Hybrid2024-2026Physical sabotage via OT, AI in malware, hacktivism as proxyFrostyGoop - heating shutdown in Lviv (2024)

Critical infrastructure sabotage - new tools

FrostyGoop - Modbus as a weapon

FrostyGoop is the first malware to use the Modbus TCP protocol for direct sabotage of industrial systems. Discovered by Dragos in April 2024, it was used in the attack on LvivTeploEnergo in January 2024.

Mechanism of action:

  • Attackers gained access to the OT network of the district heating utility
  • The malware sent crafted Modbus commands to ENCO controllers
  • Controllers began reporting incorrect temperature readings
  • Heating systems were automatically shut down
  • Over 600 residential buildings lost heating in sub-zero temperatures

WARNING

FrostyGoop demonstrates that attackers do not need to exploit software vulnerabilities - knowledge of the communication protocol is sufficient. Modbus TCP has no built-in authentication or encryption mechanisms.

Sandworm (APT44) - cyber-kinetic coordination

Sandworm, operating as GRU Unit 74455, evolved from destructive wipers to precisely synchronized operations combining cyberattacks with missile strikes.

Key operations 2024-2025:

  • ZEROLOT (October 2024 - March 2025) - a new wiper deployed against Ukrainian energy companies, synchronized with kinetic strikes on energy infrastructure
  • Kapeka backdoor (2024) - KAMACITE (a component of the Sandworm ecosystem) used it to gain persistent access to systems delivering heat, water, and electricity
  • WRECKSTEEL (March 2025) - attack on Ukrainian government systems using phishing and data-stealing malware

Hacktivism as a geopolitical tool

The war created a new threat category: state-aligned hacktivism - groups formally independent but operationally coordinated with intelligence services.

Russian side

GroupFormedMain operationsAffiliations
NoName057(16)March 2022DDoS against NATO governments, 1,500+ attacksCoordination with CARR, KillNet
Cyber Army of Russia Reborn (CARR)2022Attacks on US water systems, meat processing plantsMembers transitioned to Z-Pentest, Sector16
KillNet2022DDoS against airports, hospitals in EuropeReorganized in 2024, some members moved to Black Skills
Z-Pentest / Sector16September 2024 / January 2025Attacks on SCADA systems in the US and EuropeComposed of former CARR and NoName057(16) members

TIP

CISA issued alert AA25-343a (December 2025) on pro-Russian hacktivists targeting US and global critical infrastructure. Organizations operating OT systems should verify internet-facing access to HMI interfaces.

IT Army of Ukraine

Ukraine also conducts offensive cyber operations. The IT Army of Ukraine, established in February 2022 by Minister of Digital Transformation Mykhailo Fedorov, evolved from a loose volunteer group into a sophisticated structure:

  • 125,000 members in 2025
  • Cooperation with GUR (Main Intelligence Directorate) in DDoS and data exfiltration operations
  • Evolution from simple DDoS attacks (+50% in 2024) to cyber intelligence operations, data exfiltration, and persistent access to Russian systems
  • In June 2024, the group contributed to the largest DDoS attack in history, paralyzing the Russian banking sector

”Dark Covenant” - the state and cybercrime

The Recorded Future report “Dark Covenant 3.0” (2025) documents how Russia transitioned from tolerating cybercrime to actively managing criminal groups as geopolitical instruments.

Key mechanisms:

  1. Selective impunity - arrests of ransomware group members (e.g., REvil in 2022) are tied to diplomatic cycles, not law enforcement
  2. Group consolidation - after the Conti chat leaks (2022) and BlackBasta leaks (2024), it was revealed that senior members maintain contacts with Russian intelligence services
  3. Hacktivism as cover - hacktivist groups (NoName057(16), CARR) conduct operations that intelligence services can deny
  4. Technology transfer - tools developed by APT groups enter the cybercriminal ecosystem (e.g., the EternalBlue exploit used in NotPetya and WannaCry)

Implications for organizations in Europe

The Russia-Ukraine conflict directly affects the security of organizations in Poland and across Europe:

Supply chain attacks - IT service providers for Ukrainian organizations become targets, which can impact their European clients and partners.

Hacktivism as a vector - pro-Russian hacktivist groups have repeatedly attacked critical infrastructure of NATO countries, including Poland. DDoS attacks on government portals and banking systems are regular occurrences.

Escalation of OT techniques - tools developed for attacks on Ukrainian infrastructure (FrostyGoop, Industroyer) can be adapted against similar systems in Europe. Many European district heating and energy systems use the same controllers and protocols.

TIP

Organizations operating critical infrastructure should:

  • Verify IT/OT network segmentation and access to industrial protocols (Modbus, DNP3, IEC 104)
  • Monitor hacktivist activity on forums and Telegram channels associated with NoName057(16)
  • Implement CISA AA25-343a recommendations for securing HMI interfaces
  • Conduct incident response exercises that include OT system attack scenarios

Summary

The Russia-Ukraine war has permanently altered the global cyber threat ecosystem. The boundary between state operations, cybercrime, and hacktivism has virtually disappeared. Tools developed for the conflict - from wipers to OT malware - are becoming available to an increasingly broad range of actors.

For organizations in Poland and Europe, this means cybersecurity must be treated not as a technology problem but as an element of national security. OT systems and critical infrastructure require particular attention - as FrostyGoop demonstrated, an attack on an industrial controller can have a direct impact on the lives of thousands of people.

SEQRED helps critical infrastructure organizations assess their resilience against these types of threats - from OT system penetration testing to APT attack simulations in a red teaming format.

Sources

Need help in this area?

Our experts will help you assess the risk and plan next steps.

Talk to an expert

We'll discuss scope, methodology, and timeline.

+48 22 292 32 23 Talk to an expert