7 min read
7 min read

Ukrainian hacktivist groups BO Team and Ukrainian Cyber Alliance announced a cyberattack against Russia’s Gaskar Group, a major drone supplier for Moscow’s military.
This coordinated operation, reportedly supported by Ukraine’s military intelligence, was declared via Telegram, where hackers detailed the extent of their infiltration.
According to their claims, Gaskar Group’s network was fully compromised, highlighting how cyberwarfare has become a crucial weapon alongside drones and artillery in modern conflicts like Ukraine’s ongoing defense against Russia.

The attackers revealed that their campaign successfully captured and dismantled the Gaskar Group’s network and server infrastructure.
BO Team boasted about reaching “the very tonsils of demilitarization,” claiming their deep access allowed for the complete shutdown of operations.
They emphasized that this wasn’t a mere data breach, but a coordinated assault aimed at inflicting real, long-term damage to the Russian drone supply chain, focusing primarily on paralyzing production and data systems crucial to drone deployment.

According to the BO Team’s Telegram post, the cyber operation destroyed 47 terabytes of Gaskar Group’s production data, including 10 terabytes of backup files.
This data reportedly contained technical information on drone production and future UAV projects. By erasing primary and backup data, the attackers intended to cause enduring operational disruption, complicating any recovery efforts by Gaskar’s IT teams.

BO Team stated that they targeted production data and disabled all auxiliary systems across the Gaskar Group’s facilities. Over 250 systems, including 46 virtual servers and over 200 workstations, were destroyed.
The attackers claimed this deliberate targeting of primary production and auxiliary support systems ensured a complete operational shutdown, making immediate recovery virtually impossible.
Ukraine’s cyberattack aimed to dismantle every technical backbone supporting Gaskar’s drone production.

The Ukrainian Cyber Alliance declared that “thousands of drones won’t be reaching the front lines anytime soon.” The cyberattack effectively interrupted the supply chain of drones critical to Russia’s frontline operations in Ukraine.
With Gaskar Group being a key supplier, the loss of design files, production data, and operational capacity could significantly delay Russia’s drone manufacturing. This attack strikes a strategic point in Russia’s military logistics, disrupting weapons deliveries to its forces.

Hackers claimed they didn’t just destroy data, they also exfiltrated key technical documents, including drone source code, design documents, and employee records.
Ukraine’s military intelligence confirmed it had received the stolen data for potential use in defense planning.
This sensitive information could help Ukraine counter Russian drones more effectively, providing insights into vulnerabilities or weaknesses in the UAVs supplied by Gaskar.

Ukraine’s military intelligence agency, HUR, confirmed its involvement in the cyberattack against Gaskar Group.
In statements to Ukrainian media, HUR described the operation as successful and claimed it had paralyzed Gaskar’s accounting, production software, and internet infrastructure.
Ukraine’s public confirmation of the hack suggests a growing confidence in using cyberattacks as an official, open component of its military strategy, signaling to Russia that attacks on its industrial base will persist.

In response to media inquiries, Gaskar Group acknowledged an “attempted attack” but insisted that its operations continued normally. However, no detailed evidence was provided to support this claim.
Security experts note denial is a common tactic following cyber incidents to limit reputational damage.
Whether Gaskar’s drone production is truly unaffected remains uncertain, but Ukraine’s hackers threaten to release additional proof if the firm continues to downplay the breach’s severity.

Drones have played a central role in Russia’s tactics against Ukraine. Both small, hobby-grade drones and larger models are used extensively for reconnaissance and attacks.
Disrupting the supply of these drones weakens Russia’s frontline capabilities. The Gaskar cyberattack represents a shift in Ukraine’s defense strategy, attacking Russia’s industrial production chain through cyberwarfare rather than direct military confrontation.

An unexpected side effect of the cyberattack was the disabling of Gaskar’s physical building security systems. Hackers said their intrusion was so deep that doors inside the facility were locked electronically, forcing employees to trigger fire alarms to escape.
This illustrates how deeply interconnected physical infrastructure can be to networked systems and highlights that cyberattacks can have real-world consequences beyond data loss, potentially endangering personnel or creating operational chaos during the breach.

Beyond technical data, hackers claimed to have stolen Gaskar employees’ records, including home addresses and family details. Some of this information has reportedly been published online.
This adds another dimension to the attack, introducing privacy breaches alongside industrial sabotage.
By exposing employees’ data, the hacktivists aim to exert psychological pressure on companies and their workforce to erode morale and create fear within Russia’s defense supply network.

In a controversial claim, the BO Team stated that evidence from the stolen documents suggests that China is involved in supporting the Gaskar Group.
The hackers allege that Chinese assistance includes training specialists and helping with drone production. While these claims remain unverified, the potential of Chinese cooperation with Russian defense manufacturers raises geopolitical concerns.
If true, China’s role in supporting Russia’s drone programs could draw increased scrutiny from Ukraine’s allies in the West.

This month, the Gaskar attack marks the second known cyber incident against Russian drone firms. Earlier, firmware developers who convert commercial drones for combat use reported breaches that disrupted their distribution servers.
Ukraine’s hackers appear to be focusing on Russia’s drone sector as a strategic weak point. By systematically targeting drone production companies, Ukraine aims to undercut Russia’s technological edge and complicate efforts to replenish battlefield supplies.

BO Team labeled the operation the most severe cyber disruption Gaskar has faced. With over 250 systems destroyed and entire backups deleted, the hackers boast that Gaskar’s production infrastructure was crippled “completely.”
The company’s IT and production capabilities could take months to recover if these claims are accurate. Even partial recovery will depend on whether any offline backups survived or essential operational knowledge is now irretrievably lost.

The ease with which Ukraine’s hackers reportedly breached Gaskar’s infrastructure raises questions about Russia’s cybersecurity posture. Repeated successful attacks against critical defense suppliers suggest serious weaknesses in Russia’s protective measures.
This latest incident underscores that even firms supporting military operations may not adequately defend against coordinated cyber offensives. Russia’s military-industrial complex might now be a soft target in Ukraine’s broader cyberwarfare campaign.
Surprised by how easily systems can be breached? See how a US student pulled off a major education data hack.

The Gaskar hack signals Ukraine’s deepening reliance on cyber capabilities in its fight against Russia. From targeting state institutions to industrial suppliers, Ukrainian official and volunteer cyber forces are waging a parallel war across digital landscapes.
This strategy seeks to disrupt military operations and sow chaos within Russia’s infrastructure, forcing the Kremlin to divert resources into cyber defense. In modern warfare, ones and zeroes can be as deadly as missiles.
Curious how tech power shapes modern battles? See how xAI’s building its AI infrastructure in Memphis.
What do you think about Ukrainian cyberattackers destroying the Russian data firm? Please share your thoughts and drop a comment.
Read More From This Brand:
Don’t forget to follow us for more exclusive content on MSN.
This slideshow was made with AI assistance and human editing.
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!