Agitated by Russia’s war against Ukraine, a group of hackers from the country are allegedly waging a war against the government. According to sources, a group of Russian citizens called the ‘NRA’ launched a systemized attack on software development company Unisoftware and accessed sensitive information. The data breach impacted systems of the websites affiliated with the Russian government.
The hacker collective collected data, including credentials of bank accounts and personal accounts, sensitive employee information, phone numbers, addresses, and codes for software, among other details.
The hacker group contacted Ukraine’s English-language newspaper Kyiv Post on October 2 to take responsibility for the ransomware attack. They called themselves a part of the National Republican Army (NRA), an alleged secret group against Russian President Vladimir Putin’s rule.
The NRA hackers claimed to have launched a ransomware attack on Unisoftware and stole all the data belonging to the company. They further threatened to leak the information if the ransom was not paid. The software company offers web applications and cloud and desktop solutions. The news organization confirmed the hacking after going through the documents that belonged to Unisoftware’s Russian government clients.
The report further added that the clients impacted by the data breach included the Federal Tax Service, the Ministry of Finance of the Russian Federation, and the Central bank of Russia. However, the hackers denied commenting on this.
The hackers told the media that they did not want to see the death of innocent civilians, women, and children. Young men were being sent to an unjust war against Ukraine. “It’s funny because they tried to kick us out and fix the machines. They don’t understand that we are still there and have been there for months….” At the time, there is no clarity in terms of the data that the hackers have access to.
On 24 February, Russia invaded Ukraine after the two could not resolve internal conflicts that began after the Ukrainian Revolution of Dignity in 2014.
The EU’s CSAM law lapse creates a dangerous gap, weakening detection efforts and risks of child sexual exploitation online.
Subsequent actions, including the release of a free decryption key, weakened the group’s operations significantly.
CVE-2026-35616 and CVE-2026-21643 flaws in FortiClientEMS enable SQL Injection and RCE, with attackers actively exploiting them in real-world attacks.
For individuals and organizations, the risk is no longer occasional—it is constant, and it is evolving.
The continued dominance of phishing emails cyberattacks reflects a broader trend in the cybersecurity landscape.
A $285 million exploit had wiped out more than half of the Solana-based decentralized perpetual futures exchange's total value.
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More