Cybersecurity experts from the Security Service in Kharkiv uncovered a member of the Russian hacking group "People's Cyber Army of the Russian Federation," which is under the control of the FSB.
The offender adjusted enemy fire in the city and prepared cyberattacks on Ukrainian government websites. Following the perpetrator's instructions, the Russian forces launched two missile strikes on civilian infrastructure in the regional center, including a local hospital.
The individual also conducted reconnaissance on the locations of the Armed Forces in the region, focusing on potential artillery positions and air defense systems of the Ukrainian Armed Forces.
Additionally, the hacker carried out FSB assignments to prepare a series of DDoS attacks on the websites of state enterprises and government bodies in Ukraine.
As a result of counterintelligence operations, the SSU apprehended the perpetrator.
According to the investigation, the suspect is a local resident and IT specialist whom the FSB engaged in cooperation through a specialized Telegram channel for hacker communities.
To gather intelligence on the dislocation of the Armed Forces, the suspect covertly traversed the area and clandestinely documented objects where, according to his "version," Ukrainian defenders could be present.
He transmitted the collected information to the FSB through a popular messaging app in the form of screenshots of electronic maps with coordinates of potential targets.
During the search at the detainee's residence, three mobile phones, a laptop, and flash drives used in subversive activities in favor of the Russian Federation were seized.
Based on the collected evidence, SSU investigators informed him of suspicion under Part 3 of Article 114-2 of the Criminal Code of Ukraine (unauthorized dissemination of information about the direction, movement of weapons, ammunition, and military supplies to Ukraine, the movement or placement of the Armed Forces). The suspect is currently in custody and faces up to 12 years in prison.