IT Army of Ukraine | |
---|---|
IT-армія України | |
Active | 26 February 2022 – present[1] |
Country | Ukraine |
Branch | Cyberwarfare |
Size | ~1000 Ukrainian and foreign volunteers as of 3 March 2022[update][2] |
Website | itarmy.com.ua |
The IT Army of Ukraine (Ukrainian: IT-армія України) is a volunteer cyberwarfare organisation created at the end of February 2022 to fight against digital intrusion of Ukrainian information and cyberspace after the beginning of the Russian invasion of Ukraine on February 24, 2022.[1][3] The group also conducts offensive cyberwarfare operations, and Chief of Head of State Special Communications Service of Ukraine Victor Zhora said its enlisted hackers would only attack military targets.[4]
On 26 February 2022, the Minister of Digital Transformation and First Vice Prime Minister of Ukraine, Mykhailo Fedorov announced the creation of the IT Army, which is mainly coordinating its efforts via Telegram and Twitter.[5][6]
According to Reuters, the Ukrainian government asked for volunteers from the country's hacker underground to help protect critical infrastructure and conduct cyber spying missions against Russian troops. Yegor Aushev, the co-founder of a Ukrainian cybersecurity firm Hacken,[7] wrote, "Ukrainian cybercommunity! It's time to get involved in the cyber defense of our country," asking hackers and cybersecurity experts to submit an application listing their specialties, such as malware development and professional references.[8]
The volunteers who joined the group are divided into offensive and defensive cyber units. While the offensive volunteer unit would help Ukraine's military conduct digital espionage operations against invading Russian forces, the defensive unit would be employed to defend infrastructure such as power plants and water systems.[1]
The Ukrainian government used Twitter and Telegram to share a list of Russian and Belarusian targets for the army to attack.[9] Russian ransomware operators responded by offering their assistance to counter the Ukrainian effort.[10]
Hacking in the 2020s
| |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Major incidents |
| ||||||||||
Groups |
| ||||||||||
Individuals |
| ||||||||||
Major vulnerabilities publicly disclosed |
| ||||||||||
Malware |
|