GRU Unit 29155

{{short description|Unit of the Russian Main Intelligence Directorate}}

Unit 29155 is a Russian military intelligence (GRU) unit associated with foreign assassinations and other activities apparently aimed at destabilizing European countries. The unit is thought to have operated in secret since at least 2008, though its existence only became publicly known in 2019.{{Cite news|last=Schwirtz |first=Michael |date=22 December 2019 |title=How a Poisoning in Bulgaria Exposed Russian Assassins in Europe |newspaper=The New York Times |url=https://www.nytimes.com/2019/12/22/world/europe/bulgaria-russia-assassination-squad.html }}

Organization and method

The Unit is commanded by Maj. Gen. {{ill|Andrei Vladimirovich Averyanov|d|Q121820583}} and based at the headquarters of the 161st Special Purpose Specialist Training Center in eastern Moscow. Its membership has included veterans from Russian wars in Afghanistan, Chechnya, and Ukraine, identified as Denis Sergeev (aka Sergei Fedotov), Alexander Mishkin (aka Alexander Petrov), Anatoliy Chepiga (aka Ruslan Boshirov, a Hero of the Russian Federation, Russia's highest honor), Sergey Lyutenkov (aka Sergey Pavlov), Eduard Shishmakov (aka Eduard Shirokov), Vladimir Moiseev (aka Vladimir Popov), Ivan Terentyev (aka Ivan Lebedev), Nikolay Ezhov (aka Nikolay Kononikhin), Alexey Kalinin (aka Alexei Nikitin), and Danil Kapralov (aka Danil Stepanov).{{Cite web|url=https://www.bellingcat.com/news/uk-and-europe/2019/11/23/the-dreadful-eight-grus-unit-29155-and-the-2015-poisoning-of-emilian-gebrev/ |title=The Dreadful Eight: GRU's Unit 29155 and the 2015 Poisoning of Emilian Gebrev |date=23 November 2019 |publisher=Bellingcat |location=Leicester, England |language=en-GB |archive-url=https://web.archive.org/web/20191123150521/https://www.bellingcat.com/news/uk-and-europe/2019/11/23/the-dreadful-eight-grus-unit-29155-and-the-2015-poisoning-of-emilian-gebrev/ |archive-date=23 November 2019 |url-status=live |df=dmy}}{{Cite web|url=https://theins.ru/politika/189327|script-title=ru:Отравительная восьмерка. Как и зачем 8 сотрудников ГРУ пытались отравить «Новичком» болгарского предпринимателя Гебрева |trans-title=Poisonous Eight. How and why 8 GRU employees tried to poison the Bulgarian entrepreneur Gebrev with "Novichok" |date=23 November 2019|website=The Insider |language=ru-RU |archive-url=https://web.archive.org/web/20191204075838/https://theins.ru/politika/189327 |archive-date=4 December 2019 |url-status=live |df=dmy}}

Le Monde reported in December 2019, citing French intelligence contacts, that 15 agents connected with Unit 29155 visited the Haute-Savoie region of the French Alps between 2014 and 2018 including Alexander Petrov and Ruslan Boshirov who are believed to be responsible for the Skripal poisoning.{{cite news|last=Janjevic|first=Darko|url=https://www.dw.com/en/russia-posted-gru-agents-in-french-alps-for-eu-ops-report/a-51548648|title=Russia posted GRU agents in French Alps for EU ops — report |publisher=Deutsche Welle (DW) |date=5 December 2019|access-date=6 December 2019}}{{Cite news|last=Bremner|first=Charles|url=https://www.thetimes.com/world/russia-ukraine-war/article/russian-assassins-hid-out-in-alpine-ski-resorts-w53nlrp0t |title=Russian assassins hid out in Alpine ski resorts |newspaper=The Times |location=London |date=6 December 2019 |access-date=6 December 2019 |url-access=subscription }} High-ranking GRU officer Denis Vyacheslavovich Sergeev (alias Sergei Fedotov) has been identified by British authorities as the commander of the team that poisoned Sergei Skripal,{{cite news |last1=Rakuszitzky |first1=Moritz |title=Third Suspect in Skripal Poisoning Identified as Denis Sergeev, High-Ranking GRU Officer |url=https://www.bellingcat.com/news/uk-and-europe/2019/02/14/third-suspect-in-skripal-poisoning-identified-as-denis-sergeev-high-ranking-gru-officer/ |work=Bellingcat |date=14 February 2019}} a former Russian military officer and double agent for the British intelligence agencies, and his daughter Yulia Skripal. Anatoliy Chepiga, one of the suspected Skripal attackers, was photographed at Averyanov's daughter's wedding in 2017.{{cite report |author=Andrew S. Bowen |date=November 24, 2020 |title=Russian Military Intelligence: Background and Issues for Congress |url=https://fas.org/sgp/crs/intel/R46616.pdf |publisher=Congressional Research Service |access-date=July 21, 2021}}

The unit's operations were described as sloppy by security officials since it has been linked to many operations that were unsuccessful.{{cite news |newspaper=Foreign Policy |title=What's This Unit of Russian Spies That Keeps Getting Outed? |first=Amy |last=Mackinnon |url=https://foreignpolicy.com/2020/07/01/what-is-unit-29155-gru-russian-spies-bounties/ |archive-url=https://archive.today/20200702004239/https://foreignpolicy.com/2020/07/01/what-is-unit-29155-gru-russian-spies-bounties/ |archive-date=July 2, 2020 |quote=While Unit 29155 is often described as secretive, its tradecraft has at times been sloppy, including implausible cover stories and repeated use of the same aliases. [...] "We only know the failures, because they fail a lot. They may be doing a lot of other things that we don't know about," said Aric Toler, who heads up Bellingcat's investigations in Eastern Europe.}}{{Cite news |last=Schwirtz |first=Michael |date=2019-10-08 |title=Top Secret Russian Unit Seeks to Destabilize Europe, Security Officials Say |language=en-US |work=The New York Times |url=https://www.nytimes.com/2019/10/08/world/europe/unit-29155-russia-gru.html |access-date=2022-07-31 |issn=0362-4331}} Several actions had to be broken off without success, such as the attempted coup in Montenegro in 2016, which was staged before the country joined NATO. In several cases, enough evidence was left behind to enable the perpetrators to be identified. Security experts{{who|date=December 2023}} wondered whether this method was chosen to signal that all opponents of the Russian regime were possible targets, no matter their location. Eerik-Niiles Kross, a former intelligence chief in Estonia, says this type of intelligence operation has become part of psychological warfare.

In August 2024, the Federal Bureau of Investigation (FBI) posted a $10,000,000 reward for information leading to the locations of Vladislav Yevgenyevich Borovkov, Denis Igorevich Denisenko, Yuriy Fedorovich Denisov, Dmitriy Yuryevich Goloshubov, Nikolay Aleksandrovich Korchagin, and Amin Timovich Stigal.{{cite web | url=https://www.fbi.gov/wanted/cyber/gru-29155-cyber-actors#:~:text=Vladislav%20Yevgenyevich%20Borovkov%2C%20Denis%20Igorevich,2020%20and%20August%20of%202024 | title=Gru 29155 Cyber Actors }}{{cite web | url=https://www.justice.gov/opa/pr/five-russian-gru-officers-and-one-civilian-charged-conspiring-hack-ukrainian-government | title=Office of Public Affairs | Five Russian GRU Officers and One Civilian Charged for Conspiring to Hack Ukrainian Government | United States Department of Justice | date=5 September 2024 }}

Activities

Unit 29155 was linked — by the investigative Bellingcat website using OSINT (open-source intelligence) — to the attempted assassinations of Bulgarian arms dealer Emilian Gebrev in April 2015 and the former GRU Colonel Sergei Skripal in March 2018, both possibly overseen by the same agent.{{cite news|url=https://www.themoscowtimes.com/2019/11/25/8-russian-agents-linked-to-bulgaria-poisoning-bellingcat-a68306 |title=8 Russian Agents Linked to Bulgaria Poisoning – Bellingcat|work=The Moscow Times|date=25 November 2019|access-date=6 December 2019}} According to Ben Macintyre in the London Times in December 2019, the unit is believed to be responsible for a destabilisation campaign in Moldova and a failed pro-Serbian coup plot in Montenegro in 2016 including an attempt to assassinate the Prime Minister Milo Đukanović and occupy the parliament building by force.{{cite news|last=Macintyre|first=Ben|url=https://www.thetimes.com/comment/article/smersh-spy-killers-are-back-in-business-3m25kwtmn|title=Smersh spy-killers are back in business|work=The Times|location=London|date=6 December 2019|access-date=6 December 2019 |url-access=subscription }}{{cite news |title=Serbs Convicted in Montenegro Return Home Awaiting Appeals |url=https://balkaninsight.com/2019/05/13/serbs-convicted-in-montenegro-return-home-awaiting-appeals/ |work=Balkan Insight |date=13 May 2019}} Russia has denied all accusations.{{cite news |title=Montenegro Seeks to Lure More Russian Tourists |url=https://balkaninsight.com/2018/03/16/montenegro-eyes-more-russian-tourists-in-2018-03-15-2018/ |work=Balkan Insight |date=16 March 2018}}

The men mentioned by Czech police in relation to 2014 Vrbětice ammunition warehouses explosions were the same men identified by Bellingcat in the Skripal poisoning case.{{Cite web|date=2021-04-20|title=Senior GRU Leader Directly Involved With Czech Arms Depot Explosion|url=https://www.bellingcat.com/news/2021/04/20/senior-gru-leader-directly-involved-with-czech-arms-depot-explosion/|access-date=2021-04-24|website=Bellingcat|language=en-GB}}

=2014 Vrbětice ammunition warehouses explosions=

{{Main|2014 Vrbětice ammunition warehouses explosions}}

Andrej Babiš, the prime minister of Czechia, announced on 17 April 2021 that Unit 29155 was behind the 2014 Vrbětice ammunition warehouses explosions, which resulted in the death of two Czech citizens and damage exceeding CZK 1 billion.{{Cite web|url=https://www.seznamzpravy.cz/clanek/babis-je-podezreni-ze-ruska-rozvedka-se-podailela-na-vybuchu-ve-vrbeticich-151000|access-date=2021-04-17|title=Exkluzivně: Rusové podezřelí z výbuchu ve Vrběticích jsou ti, kteří otrávili agenta Skripala |trans-title=Exclusive: Russians suspected of an explosion in Vrbětice are those who poisoned Agent Skripal |website=www.seznamzpravy.cz|date=17 April 2021 }} Czech police was seeking information from the public on two suspects: Alexander Mishkin (aka Alexander Petrov), Anatoliy Chepiga (aka Ruslan Boshirov).{{Cite web |title=Národní centrála proti organizovanému zločinu SKPV, žádá... |trans-title=National Central Office against Organized Crime SKPV, asks... |url=https://twitter.com/policiecz/status/1383478030505365514 |access-date=2021-04-17 |website=Twitter |language=en}} On April, 29 2024 Police of the Czech Republic announced the completion of the investigation of explosions, stating that it considered it proven that the explosions were carried out by GRU.{{Cite web|url=https://www.policie.cz/clanek/ukonceni-proverovani-vybuchu-municnich-skladu-ve-vrbeticich.aspx |title=Ukončení prověřování výbuchů muničních skladů ve Vrběticích |trans-title=Completion of the investigation of the explosions of ammunition warehouses in Vrbětice |date=2024-04-29|website=Police of the Czech Republic |language=cs |archive-url=https://web.archive.org/web/20240429113647/https://www.policie.cz/clanek/ukonceni-proverovani-vybuchu-municnich-skladu-ve-vrbeticich.aspx |archive-date=2024-04-29 |url-status=live}} In May 2024, the commander of Unit 29155, Averyanov, was declared wanted by the Czech Police.{{Cite web|url=https://theins.ru/news/271484 |script-title=ru:Чехия объявила в розыск за организацию взрывов во Врбетице известного по расследованиям The Insider ГРУшника Аверьянова |trans-title=Czechia has declared wanted for organizing Vrbětice explosions the GRU agent Averyanov known from The Insider's investigations |date=11 May 2024|website=The Insider |language=ru-RU |archive-url=https://web.archive.org/web/20240511075616/https://theins.ru/news/271484 |archive-date=11 May 2024 |url-status=live |df=dmy}}{{Cite web |title=Hledaný muž: AVERIYANOV ANDREY |trans-title=Wanted man: AVERIYANOV ANDREY |url=https://aplikace.policie.cz/patrani-osoby/PersonDetail.aspx?person_id=17270507245030 |access-date=2024-05-11 |website=Police of the Czech Republic |language=cs}}

=Alleged bounty program and arms smuggling=

{{main|Russian bounty program}}

In 2020, a CIA assessment reported that Unit 29155 operated a Russian bounty program that offered cash rewards to Taliban-linked militants to kill U.S. and other coalition soldiers in Afghanistan.{{cite news |last1=Nakashima |first1=Ellen |last2=DeYoung |first2=Karen |last3=Ryan |first3=Missy |last4=Hudson |first4=John |title=Russian bounties to Taliban-linked militants resulted in deaths of U.S. troops, according to intelligence assessments |url=https://www.washingtonpost.com/national-security/russian-bounties-to-taliban-linked-militants-resulted-in-deaths-of-us-troops-according-to-intelligence-assessments/2020/06/28/74ffaec2-b96a-11ea-80b9-40ece9a701dc_story.html |newspaper=The Washington Post |date=28 June 2020|access-date=29 June 2020}}{{cite news |title=U.S. commander: Intel still hasn't established Russia paid Taliban 'bounties' to kill U.S. troops |url=https://www.nbcnews.com/politics/national-security/u-s-commander-intel-still-hasn-t-established-russia-paid-n1240020 |work=NBC News |date=September 14, 2020}} The assessment said several US military personnel died as a result of a bounty program.{{cite news|last1=Savage|first1=Charlie|last2=Schmitt|first2=Eric|last3=Schwirtz|first3=Michael|title=Russia Secretly Offered Afghan Militants Bounties|url=https://www.nytimes.com/2020/06/26/us/politics/russia-afghanistan-bounties.html|work=The New York Times|date=27 June 2020|access-date=27 June 2020}} According to the New York Times, on 1 July, the National Intelligence Council produced a document in which various intelligence agencies assessed the credibility of the existence of a bounty program based on the available evidence, gleaned in part from interrogations of captured Islamist militants by Afghanistan's government.{{cite news |title=Opinion: Why we need a little skepticism, and more evidence, on Russian bounties |url=https://thehill.com/opinion/national-security/505804-why-we-need-a-little-skepticism-and-more-evidence-on-russian |first1=David B. Jr. |author-link=David B. Rivkin |last1=Rivkin |first2=George S. |last2=Beebe |work=The Hill |date=July 5, 2020}} Anonymous officials who had seen the memo said that the "C.I.A. and the National Counterterrorism Center had assessed with medium confidence—meaning credibly sourced and plausible, but falling short of near certainty"—that bounties had been offered. Other parts of the intelligence community, including the National Security Agency, said they "did not have information to support that conclusion at the same level", and so had lower confidence in the conclusion.{{cite news |last1=Savage |first1=Charlie |last2=Schmitt |first2=Eric |last3=Callimachi |first3=Rukmini |last4=Goldman |first4=Adam |title=New Administration Memo Seeks to Foster Doubts About Suspected Russian Bounties |url=https://www.nytimes.com/2020/07/03/us/politics/memo-russian-bounties.html |access-date=5 July 2020 |work=The New York Times |date=3 July 2020}} Both Russia and the Taliban have denied the existence of a program.{{cite news|last=Brennan|first=David|url=https://www.newsweek.com/what-unit-29155-russia-intel-branch-accused-us-troop-bounties-1514026|title=What Is Unit 29155? The Russia Intel Branch Accused of U.S. Troop Bounties|work=Newsweek|date=29 June 2020|access-date=29 June 2020}} In July 2020, Defense Secretary Mark Esper said that General Kenneth McKenzie and General Scott Miller, the top U.S. military commander in Afghanistan, did not think "the reports were credible as they dug into them." General Kenneth McKenzie, the commander of U.S. Central Command, said that he found no "causative link" between reported bounties to actual U.S. military deaths.{{cite news |title=Top Pentagon officials say Russian bounty program not corroborated |url=https://abcnews.go.com/Politics/top-pentagon-officials-russian-bounty-program-corroborated/story?id=71694167 |first=Luis |last=Martinez |work=ABC News |date=July 10, 2020}} In April 2021, The Daily Beast and NBC News reported that the U.S. intelligence community only had "low to moderate confidence" in the bounty program allegations.{{cite news |last1=Rawnsley |first1=Adam |last2=Ackerman |first2=Spencer |date=April 15, 2021 |title=U.S. Intel Walks Back Claim Russians Put Bounties on American Troops |url=https://www.thedailybeast.com/us-intel-walks-back-claim-russians-put-bounties-on-american-troops |url-status=live |archive-url=https://web.archive.org/web/20210923050129/https://www.thedailybeast.com/us-intel-walks-back-claim-russians-put-bounties-on-american-troops |archive-date=September 23, 2021 |access-date=April 15, 2021 |newspaper=The Daily Beast}}{{cite news |author=Ken Dilanian and Mike Memoli |date=April 15, 2021 |title=Remember those Russian bounties for dead U.S. troops? Biden admin says the CIA intel is not conclusive |url=https://www.nbcnews.com/politics/national-security/remember-those-russian-bounties-dead-u-s-troops-biden-admin-n1264215 |url-status=live |archive-url=https://web.archive.org/web/20210605210636/https://www.nbcnews.com/politics/national-security/remember-those-russian-bounties-dead-u-s-troops-biden-admin-n1264215 |archive-date=June 5, 2021 |access-date=April 16, 2021 |publisher=NBC News}} On 8 January 2025, The Insider, with assistance from Der Spiegel, published the results of a new investigation into the GRU-Taliban program alleging that the program also included the transfer of arms and munitions used in attacks on NATO forces in Afghanistan.{{cite web |first1=Roman |last1=Dobrokhotov |first2=Christo |last2=Grozev |first3=Michael |last3=Weiss |date=8 January 2025 |title=Afgantsy Redux: How Russian military intelligence used the Taliban to bleed U.S. forces at the end of America's longest war |url=https://theins.ru/en/politics/277723 |access-date=2025-04-01 |website=The Insider |language=}}

===Alleged connection to Havana syndrome===

In April 2024, 60 Minutes, Der Spiegel and The Insider published a joint investigation which alleges that Unit 29155 is connected to cases of "Havana syndrome", where U.S. employees or their family members have experienced symptoms in the range from pain and ringing in the ears to cognitive dysfunction.{{Cite web |first1=Roman |last1=Dobrokhotov |first2=Christo |last2=Grozev |first3=Michael |last3=Weiss |date=31 March 2024 |title=Unraveling Havana Syndrome: New evidence links the GRU's assassination Unit 29155 to mysterious attacks on U.S. officials and their families |url=https://theins.ru/en/politics/270425 |access-date=2024-04-01 |website=The Insider |language=}} Among the core findings of the year-long collaboration of Roman Dobrokhotov, Christo Grozev and Michael Weiss were that senior members of the unit received awards and political promotions for work related to the development of non-lethal acoustic weapons; and that members of the unit have been geolocated to places around the world just before or at the time of reported incidents. The Kremlin Press Secretary dismissed the report as "nothing more than baseless, unfounded accusations by the media."{{Cite web |date=2024-04-01 |title=Kremlin dismisses report Russia behind 'Havana Syndrome' |website=Reuters |url=https://www.reuters.com/world/europe/kremlin-dismisses-report-russia-behind-havana-syndrome-2024-04-01/ |access-date=2024-07-10}} In response to the report, the White House Press Secretary continued to back a March 2023 report by the National Intelligence Council that an enemy adversary was unlikely.{{Cite web |date=2024-04-01 |title=US not moved by report blaming Russia for 'Havana Syndrome' |url=https://www.voanews.com/a/us-not-moved-by-report-blaming-russia-for-havana-syndrome/7552401.html |access-date=2024-07-10 |website=Voice of America |language=en}}

=Russo-Ukrainian War=

Beginning in 2020, to support Russia's efforts in the Russo-Ukrainian War, many cyber attacks on Ukraine and the countries of NATO allegedly were conducted by GRU 161st Specialist Training Center (Unit 29155), which is responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm since at least 2020, that often used multiple families of destructive wiper malware including "WhisperGate." The United States Justice Department indicted six individuals associated with GRU Unit 29155: five GRU officers (Vladislav Borovkov ({{langx|ru|Владислав Боровков}}), Denis Igorevich Denisenko ({{langx|ru|Денис Игоревич Денисенко}}), Yuriy Denisov ({{langx|ru|Юрий Денисов}}), Dmitry Yuryevich Goloshubov ({{langx|ru|Дмитрий Юрьевич Голошубов}}), and Nikolay Aleksandrovich Korchagin ({{langx|ru|Николай Александрович Корчагин}})) and one civilian (Amin Timovich Stigal ({{langx|ru|Амин Тимович Стигаль}}; born 10 January 2002, Grozny)). Also, the United States Department of State Diplomatic Security Service Rewards for Justice offers up to $10 million in reward for information about these six individuals.{{cite news |last=Бовсуновская |first=Карина (Bovsunovskaya, Karina) |url=https://www.unian.net/world/hakerskaya-ataka-rf-na-pravitelstvennye-sayty-ssha-rossiyane-pytalis-pohitit-konfidencialnuyu-informaciyu-12777195.html |title=Российские хакеры пытались атаковать правительственные учреждения США |trans-title=Russian hackers tried to attack US government agencies |language=ru |work=УНІАН (unian.net) |date=4 October 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20241009200026/https://www.unian.net/world/hakerskaya-ataka-rf-na-pravitelstvennye-sayty-ssha-rossiyane-pytalis-pohitit-konfidencialnuyu-informaciyu-12777195.html |archive-date=9 October 2024}}{{cite news |last=Гичко |first=Марта (Gichko, Marta) |url=https://www.unian.net/war/ssha-i-soyuzniki-obvinili-rossiyu-v-kiberatakah-na-ukrainu-i-nato-12749850.html |title=США и союзники обвинили Россию в кибератаках на Украину и НАТО: Речь идет о серии кибератак на Украину и другие страны, совершенных накануне вторжения и ранее. |trans-title=The United States and allies have accused Russia of cyberattacks on Ukraine and NATO: We are talking about a series of cyber attacks on Ukraine and other countries committed on the eve of the invasion and earlier. |language=ru |work=УНІАН (unian.net) |date=6 June 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20241009210800/https://www.unian.net/war/ssha-i-soyuzniki-obvinili-rossiyu-v-kiberatakah-na-ukrainu-i-nato-12749850.html |archive-date=9 October 2024}}{{cite news |last=Miller |first=Maggie |url=https://www.politico.com/news/2024/09/05/us-allied-nations-russia-cyberattacks-ukraine-nato-00177542 |title=US, allied nations accuse Russia of cyberattacks against Ukraine and NATO: Hacking efforts as part of this campaign began in 2020, and included attacks on Ukrainian groups ahead of Russia's invasion, along with critical infrastructure organizations in NATO member states. |work=Politico |date=9 May 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20240906030208/https://www.politico.com/news/2024/09/05/us-allied-nations-russia-cyberattacks-ukraine-nato-00177542 |archive-date=6 September 2024}}{{cite news |url=https://theins.ru/news/272716 |title=США объявило награду в $10 млн за чеченского хакера, связанного с ГРУ — он помогал атаковать инфраструктуру Украины |trans-title=US announces $10 million reward for Chechen hacker linked to GRU who helped attack Ukrainian infrastructure |language=ru |work=The Insider (theins.ru) |date=27 June 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20241009220654/https://theins.ru/news/272716 |archive-date=9 October 2024}}{{cite news |last=Купфер |first=Мэттью (Kupfer, Matthew) |url=https://www.golosameriki.com/a/russia-father-son-accused-cybercrimes-gru/7701912.html |title=Семейный бизнес: США обвинили в киберпреступлениях отца и сына из РФ. «Голос Америки» узнал детали их биографий |trans-title=Family Business: US Accuses Russian Father and Son of Cybercrimes. Voice of America Learns Details of Their Biographies |language=ru |work=VOA |date=18 July 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20240721234952/https://www.golosameriki.com/a/russia-father-son-accused-cybercrimes-gru/7701912.html |archive-date=21 July 2024}}{{cite web |url=https://rewardsforjustice.net/rewards/amin-stigal/ |title=Amin Stigal |work=United States Department of State Diplomatic Security Service: Rewards for Justice |date= |access-date=9 October 2024 |archive-url=https://archive.today/20240930153314/https://rewardsforjustice.net/rewards/amin-stigal/ |archive-date=30 September 2024}}{{cite web |url=https://www.state.gov/attribution-of-russias-malicious-cyber-activity-against-ukraine/ |title=Attribution of Russia's Malicious Cyber Activity Against Ukraine |work=United States State Department |date=10 May 2022 |access-date=9 October 2024 |archive-url=https://archive.today/20220510160018/https://www.state.gov/attribution-of-russias-malicious-cyber-activity-against-ukraine/ |archive-date=10 May 2022}}{{cite web |url=https://x.com/RFJ_USA/status/1831739289173885095/photo/1 |title=Reward up to 10 million dollars for information on Russian military intelligence officers |work=United States Department of State Diplomatic Security Service: Rewards for Justice |date=5 September 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20241009212523/https://x.com/RFJ_USA/status/1831739289173885095 |archive-date=9 October 2024}}{{cite news |url=https://rewardsforjustice.net/rewards/gru-officers-unit-29155/ |title=GRU Officers – Unit 29155 |work=United States Department of State Diplomatic Security Service: Rewards for Justice |date= |access-date=9 October 2024 |archive-url=https://archive.today/20241009221755/https://rewardsforjustice.net/rewards/gru-officers-unit-29155/ |archive-date=9 October 2024}}{{cite web |url=https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-057a |title=Update: Destructive Malware Targeting Organizations in Ukraine. Alert Code:AA22-057A |work=Cybersecurity and Infrastructure Security Agency (cisa.gov) |date=28 April 2022 |access-date=9 October 2024 |archive-url=https://archive.today/20240906023416/https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-057a |archive-date=6 September 2024}}{{cite web |url=https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a |title=Russian Military Cyber Actors Target US and Global Critical Infrastructure. Alert Code:AA24-249A |work=Cybersecurity and Infrastructure Security Agency (cisa.gov) |date=5 September 2024 |access-date=9 October 2024 |archive-url=https://archive.today/20240906020046/https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a |archive-date=6 September 2024}}{{efn|GRU-affiliated cyber groups are Unit 26165 and Unit 74455.}}{{Excessive citations inline|date=March 2025}}

See also

Notes

{{Notelist}}

References