Privacy Ninja

Ukraine Dismantles 5 Disinformation Bot Farms, Seizes 10,000 SIM Cards

Ukraine Dismantles 5 Disinformation Bot Farms, Seizes 10,000 SIM Cards

The Ukrainian Security Service (SSU) has announced that since the start of the war with Russia, it has discovered and shut down five bot farms with over 100,000 fake social media accounts spreading fake news.

The network, which operated in Kharkiv, Cherkasy, Ternopil, and Zakarpattia, aimed to discourage Ukrainian citizens and instill panic by distributing false information about the Russian invasion and the status of the defenders.

According to the SSU’s announcement, the goal of the network was to destabilize the sociopolitical situation in various regions, thus curbing the resistance of the Ukrainian militia.

The law enforcement agency in Ukraine raided the locations that hosted the bot farms and seized the following items:

  • 100 sets of GSM gateways
  • 10,000 SIM cards for various mobile operators to disguise the fraudulent activity
  • Laptops and computers used for controlling and coordinating the bots
Terminals with SIM cards emulating distinct users
Terminals with SIM cards emulating distinct users (SSU)

The attribution for the operation points to the Russian special services, members of which are already facing criminal proceedings under Article 110 (encroachment on the territorial integrity and inviolability of Ukraine), but no operator arrests are mentioned in the SSU announcement.

Also Read: Data Storage Security Standards: What Storage Professionals Need to Know

SSU image from one of the dismantled farms
One of the dismantled farms (SSU)

Ukraine’s cyber agencies operational

SSU’s website has remained offline several times and for protracted periods during the past month as the agency faced mounting challenges and had to direct its focus on deterring a military invasion.

Still, it’s notable and commendable that Ukraine’s cyber-agencies remain operational, at least to some degree, and publish daily announcements of their activities.

On Saturday, the Ukrainian cyber-police in the region of Vinnytsia announced the arrest of a man who was hacking social network accounts through phishing links and used them to run fake ammunition fundraisers.

Also Read: IT Governance Framework PDF Best Practices And Guidelines

Today, the Computer Emergency Response Team of Ukraine announced the discovery of a phishing campaign loosely attributed to the UAC-0010 (Armageddon) Russian threat group.

The campaign uses document lures that supposedly contain information about the losses of Ukrainian servicemen to drop the “PseudoSteel” malware which enables its operators to remotely search for local files and upload them to an FTP server.

All these detection and crackdown efforts of Ukrainian forces signify a new age in warfare where governments cannot ignore malicious cyber activities.

That’s especially the case for a country that’s still largely online, using the network for crowd-sourcing information and keeping an open channel of data exchange with the rest of the world.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us