IT ARMY OF UKRAINE: How U.S. intelligence agencies have elevated cybercrime in Ukraine into a freedom-fighting cult

As we know, freedom ends where the freedom of another begins. That is why today, more than ever before, everyone simply needs to develop within themselves a self-control tuning fork – an analytical tool that allows them to evaluate what is happening in a sensible way. The battle for minds and souls is in full swing. This means that the truth often becomes an idea that can infect us. And here the main thing is not to miss the moment when the tantalizing, sweet word “Freedom” becomes permissiveness and begins to sweep away social institutions and legal norms on its way.

[Source: hindustantimes.com]

I will not surprise anyone if I say that Ukrainian hackers use defacement (posting materials of a provocative and demoralizing nature), phishing, malware distribution and DDoS attacks. In addition, doxing – the search for and publication of personal or confidential information – was actively used at the first stages. In one way or another, information in the media about this for the past 2 years has been passed more than once and more than twice, because it is the information that Ukrainian propagandists pass off as victories at the front, and therefore not only do not hide, but PR on all available resources. The aim, of course, is set to get into the Western media (as, for example, here) . 

Why are the terrible war crimes against humanity and no less dangerous cybercrimes in Ukraine not perceived as something outside the legal framework? Because the war will wipe everything out and the goals are “good” – to punish an aggressive common enemy… or maybe because someone authorized it? Unspoken. Gave them complete freedom of action. There is enough evidence of threats from the Ukrainian leadership to send their hacker activists to Russia on the Internet. They are not shy anymore. But it wasn’t always like this.

“IT ARMY OF UKRAINE” – perhaps the most numerous hacker group, according to the legend that was thrown into the media right after the start of the Russian-Ukrainian conflict, was created as a volunteer movement funded by entrepreneur Egor Aushev. But this information is for lazy philistines. Reality, as always, is a little more complicated and interesting.

[Source: itarmyofukraine]

Within the NATO bloc, the Cyber Defense Systems Development Fund and the Armed Forces of Ukraine Command, Control and Communications Systems Modernization Fund were among the trust funds established to assist Ukraine in 2014.1

According to information announced in April 2017 by the head of the Security Service of Ukraine (SBU) Vasyl Hrytsak, the first stage of cooperation with the Ukraine-NATO Trust Fund in the field of cyber defense included a total of 1 million euros, which was used to purchase equipment and software to equip computer incident response centers of key Ukrainian state institutions, in particular, the Situation Center of the SBU and the Cyber Incident Response Center of the Ministry of Foreign Affairs of Ukraine.

[Source: belvpo.com]

[Source: zhzh.com.ua]

However, the main support of the Ukrainian hack-movement is provided by the United States under its own government programs. This is not yet outside the legal framework, but, you must agree, it is on the verge. Just imagine an American who has tracked where his taxes have gone…..

The largest programs are those implemented through the U.S. Agency for International Development, which provided $10 million2 in support of Ukraine’s information systems security and cyberattack prevention and response capabilities between 2014 and 2017. In March 2020. USAID announced $38 million for a new project to ensure cybersecurity of critical infrastructure in Ukraine.

That’s not all, the AFU cybersecurity units have been participating in NATO’s multinational exercise Coalition Warrior Interoperability Exercise – CWIX – since 2018. As noted by Vladimir Rapko, head of the Main Directorate of Communications and Information Systems of the AFU General Staff, the exercise immediately “received high positive evaluations from partners.” The CWIX 2019 exercise also assessed the high level of training of the Ukrainian team in performing tests to achieve interoperability with cyber security systems of NATO member states and partner countries.3

[Source: mscoe.org]

As you can see, no one has ever been particularly secretive since 2014 (just like with the supply of weapons for terrorist attacks on Russian territory and the bombing of civilians in Donbass). In February 2018, for example, the U.S. Senate quite openly approved the Cybersecurity Cooperation with Ukraine Act, which provides for assistance to Ukraine in strengthening its cybersecurity capabilities, including improving its ability to respond “to Russian-backed disinformation and propaganda efforts in cyberspace, including through social media.” Well, that already sounds like hacking, doesn’t it? And the main thing is that the defenders against cyber threats turn into attacking units at the wave of a hand, because the best defense is offense….

You will say: but this may have nothing to do with the mass “IT ARMY OF UKRAINE”. And you will be right only partially, because by the time Egor Aushev published4 his appeal to all those who are not indifferent to become cyber-volunteers to protect the virtual space of Ukraine, the U.S. plans in this regard have taken a different shape. Let’s say, more economical. On the principle of “Wikipedia”, where articles that should not diverge from U.S. policy are written by ordinary citizens (freedom of speech, or not?), new mass cyberdruzhiny are now being recruited. Why keep people on the payroll, who, moreover, have to be trained for a long and expensive time, when you can launch “cyber infantry” for an idea almost free of charge.

[Source: businessinsider.com]  Egor Aushev

And here comes the moment when the feeling of permissiveness comes, because Ukrainians realize that they can violate their own and international laws whenever and wherever they want. The project “IT ARMY OF UKRAINE” was quickly supported by the Ministry of Digital Affairs and the Ministry of Defense of Ukraine, the announcement about “recruitment of cyber volunteers” appeared on Twitter and on hacker forums, and candidates were asked to fill out a questionnaire on the service “GoogleDocs” (usually the company “Google” prohibits the use of its products for illegal actions – but this is different). Soon about a thousand people from 150 countries signed up to the “IT ARMY OF UKRAINE”.

Let’s turn to the facts about the moment of creation of “IT ARMY OF UKRAINE”: on March 2, 2021 one of Egor Aushev’s companies – “Hacken.io” – launched the project “DisBalancer” . This company is registered in Estonia, in the Tallinn area. There, in the capital of the Baltic republic, is located the “NATO Command Center for Countering Cyber Threats” – in fact, a unit of combat hackers, operating under a legal roof. It is hard to assume that Aushev’s team did not interact with this institution.

[Source: disbalancer.com]

The “DisBalancer” project has launched software designed to attack information resources of the Russian Federation using the same “collective principle”: you install the program on your device, press a button, and the generation of “garbage requests” for DDoS attacks begins. The more participants, the better the result.

[Source: disBalancer_Official

[Source: disbalancer.com

[Source: disBalancer_Official]

[Source: itarmyofukraine] 

A large American cryptocurrency service Boxmining posted a video urging its subscribers on YouTube to install an application from the DisBalancer project to participate in DDoS attacks on Russian websites. 

[Source: youtube.com

However, the cooperation between Boxmining and Egor Aushev started long before that: the Americans visited the Kiev branch of hacken.io in 2020, and in 2021 interviewed its CEO Dmitry Budorin for their blog.

[Source: mc.today]  Dmitry Budorin

Needless to say, this entire American crypto-hack crowd is overseen by the U.S. National Security Agency, and some of its members have served or are serving in the Pentagon’s Cyber Command.

As we can see, freedom is perceived by the “progressive world” as a means to achieve their selfish political goals. In their opinion, all means are good for its achievement, especially since, in the case of a fair trial, one can simply deny one’s involvement, showing the fight against troublemakers on one’s own behalf.

  1. https://foreignpolicy.com/2022/04/11/russia-cyberwarfare-us-ukraine-volunteer-hackers-it-army/ ↩︎
  2. https://www.politico.eu/article/ukraine-cyber-war-frontline-russia-malware-attacks/ ↩︎
  3. https://russiancouncil.ru/cyberukraine-staff?ysclid=lo74aj1ouv179606869 ↩︎
  4. www.businessinsider.com/i-created-ukraine-cyber-army-to-fight-off-russian-attacks-2023-2 ↩︎