Ukraine says cyberattacks on energy grid now used to guide missile strikes
好的,我现在要帮用户总结这篇文章的内容,控制在100字以内。首先,我需要仔细阅读文章,抓住主要信息。 文章主要讲的是俄罗斯对乌克兰能源基础设施的网络攻击。乌克兰的网络安全官员提到,这些攻击现在更多是收集情报,而不是立即破坏运营。虽然重大网络事件的数量有所下降,但威胁并没有减少。攻击者现在更关注绘制设施、跟踪维修人员以及评估能源系统恢复的速度,而不是造成停电。 文章还提到俄罗斯的长期战略,他们意识到这是一场持久战,所以现在重点转向情报收集。网络入侵发生在导弹攻击前后,帮助校准打击并评估效果。此外,俄罗斯还违反国际法,直接攻击关键基础设施。 乌克兰自2022年被入侵以来,能源设施多次被无人机和导弹袭击,导致冬季长时间停电。之前有提到Sandworm黑客组织利用网络攻击放大导弹打击的影响,但现在他们的策略转向了情报收集。 总结时要包括:俄罗斯网络攻击的目标、目的(情报收集)、影响(支持导弹打击)、以及乌克兰的情况。控制在100字以内。 可能的结构:俄罗斯针对乌克兰能源基础设施的网络攻击日益以情报收集为目标,支持导弹打击而非立即破坏。尽管重大事件减少,威胁未减。攻击者关注设施布局、维修进展及恢复能力。俄罗斯采取长期战略,违反国际法直接攻击关键设施。 </think> 俄罗斯针对乌克兰能源基础设施的网络攻击日益以情报收集为目标,支持导弹打击而非立即破坏。尽管重大事件减少,威胁未减。攻击者关注设施布局、维修进展及恢复能力。俄罗斯采取长期战略,违反国际法直接攻击关键设施。 2026-2-23 11:16:7 Author: therecord.media(查看原文) 阅读量:8 收藏

KYIV, Ukraine — Russian cyberattacks targeting Ukraine’s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, Ukrainian cybersecurity officials said.

Although the number of major cyber incidents targeting critical infrastructure has declined, the threat itself has not diminished, according to Oleksandr Potii, head of Ukraine’s State Service of Special Communications and Information Protection.

“Cyberattacks on critical infrastructure never happen on their own; they are always part of a broader operation,” Potii told Recorded Future News on the sidelines of the Kyiv International Cyber Resilience Forum last week.

He said attackers now appear more focused on mapping facilities, tracking repair crews, and assessing how quickly energy systems can recover after strikes rather than causing immediate power outages.

Natalia Tkachuk, head of cyber and information security at Ukraine’s National Security and Defense Council, said cyber operations against energy facilities increasingly reflect Russia’s long-term strategy in the war.

“Russia has realized it’s playing a long game — this will not be a blitzkrieg — so most operations now focus on intelligence gathering,” she told Recorded Future News.

Russia often maintains quiet access inside networks to monitor the extent of physical damage and track recovery efforts.

“We try to conceal this information,” Tkachuk said, adding that attackers seek to understand what equipment has been destroyed, how quickly repairs are progressing, and where replacement components are sourced.

Cyber intrusions, she said, can occur both before and after missile attacks, first to help calibrate strikes and later to assess their effectiveness.

“Russia sees that missiles are a much easier way to destroy infrastructure,” Tkachuk said, adding that Moscow is now openly violating international law by targeting such sites.

Since the start of Russia’s full-scale invasion in 2022, Ukraine’s energy infrastructure has been repeatedly targeted with drone and missile strikes. Power plants, substations, transmission lines and district heating facilities have all been hit, causing prolonged outages during the freezing winter months.

Ukrainian officials have previously warned that the Kremlin-linked hacking group Sandworm used cyber operations against energy systems to amplify the impact of missile barrages. 

Security researchers, including analysts at Google, have also observed Sandworm’s shift away from destructive cyberattacks toward intelligence-gathering operations, a trend that is now playing out on the ground.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes
如有侵权请联系:admin#unsafe.sh