Keepnet – AI-powered human risk management platform logo
Menu
HOME > blog > ukraine assembles an it army

Ukraine's IT Army: Cyber Warfare, State-Sponsored Hacking and Lessons for 2026

In 2022, Ukraine mobilized over 200,000 volunteers into a crowdsourced IT Army to conduct cyber operations against Russian infrastructure. This 2026 guide examines how Ukraine's cyber army works, the tactics used, the ethical and legal questions it raises, and what organizations can learn about cyber resilience from state-level digital warfare.

The Minister of Digital transformation of Ukraine, Mikhail Fedorov announced the creation of an army of IT specialists.

When Russia launched its full-scale military invasion of Ukraine on February 24, 2022, Ukraine's response extended far beyond conventional warfare. Within 48 hours, Ukraine had mobilized a crowdsourced cyber force, the IT Army, that would grow to over 200,000 volunteers from dozens of countries. This represented a historic first: a state-sanctioned, publicly organized digital militia conducting offensive cyber operations as a formal component of national defense.

Four years on, in 2026, Ukraine's IT Army continues to operate and has fundamentally changed how governments, military strategists, and cybersecurity professionals understand the relationship between civilian cyber expertise and state-level conflict. For organizations, the lessons from this digital battleground have direct implications for how they approach security awareness training, threat intelligence, and human risk management.

How Ukraine's IT Army Was Born

On February 26, 2022, Mykhailo Fedorov, Ukraine's Minister of Digital Transformation, posted on Twitter calling for IT specialists to join a coordinated cyber effort. He established a dedicated Telegram channel where volunteers would receive daily cyber operation assignments targeting Russian digital infrastructure. The response was immediate and massive.

Within days, the channel had hundreds of thousands of subscribers: cybersecurity professionals, ethical hackers, software engineers, and technically skilled civilians from Ukraine, Europe, the Americas, and beyond. Yegor Aushev, founder of Cyber Unit Technologies, was instrumental in organizing the offensive capability, creating an application process that allowed vetted cybersecurity experts to join the coordinated effort.

What Operations Has Ukraine's IT Army Conducted?

Through the Telegram channel, the IT Army has coordinated a wide range of cyber operations against Russian targets. Key operations have included:

DDoS attacks

Distributed Denial-of-Service attacks against Russian government websites, including the Kremlin, the Ministry of Defense, and the Federal Security Service (FSB), temporarily disrupted access to official state portals. DDoS attacks of this scale represent one of the most accessible and high-impact tools available to a large, distributed volunteer force.

Financial sector disruption

Targeting Russian banking and financial services to disrupt economic stability, including attacks on payment processing infrastructure and financial institution websites.

Critical infrastructure targeting

Operations directed at Russian power grid management systems, communication networks, railway scheduling infrastructure, and fuel distribution logistics; these are systems where disruption has immediate physical-world consequences.

Information operations

Defacement of Russian state media websites, disruption of state-controlled search engines and email providers including Yandex, and leaking of data obtained through network intrusions to undermine Russian information control.

The Role of DDoS Attacks in Ukraine's Cyber Strategy

DDoS attacks have been the IT Army's most frequently deployed tool, chosen for their accessibility to participants with varying skill levels and their ability to cause immediate, visible disruption. By flooding targeted servers with traffic from hundreds of thousands of distributed sources simultaneously, the IT Army has repeatedly knocked Russian government and financial institution websites offline for hours or days at a time.

The symbolic and psychological impact of these attacks, which demonstrated that Russian state systems are vulnerable, has been as significant as the operational disruption. In 2024 to 2026, the IT Army has evolved toward more sophisticated intrusion operations, data exfiltration campaigns, and persistent access to critical Russian systems, moving beyond blunt-force DDoS toward intelligence-grade cyber operations.

Ukraine's IT Army attracted participants from dozens of countries, raising complex legal and ethical questions that remain unresolved in 2026. Key debates include:

Legality of civilian participation

International humanitarian law (IHL) does not clearly address the status of civilian hackers participating in state-directed cyber operations. Participants from third countries may face criminal liability under their own national cyber crime laws, regardless of the legitimacy of Ukraine's defensive posture.

Escalation risk

Attacks on Russian critical infrastructure, particularly energy, finance, and communications, risks triggering retaliatory strikes against Ukrainian and Western civilian infrastructure. Several significant Russian cyber operations against European energy and transportation systems in 2023 to 2024 were attributed in part to retaliatory motives.

Insider threat risk

Recruiting unvetted volunteers at scale creates genuine insider threat exposure. State intelligence agencies (including Russia's GRU and FSB) have historically embedded assets in volunteer cybersecurity communities to gather intelligence or conduct sabotage.

Collateral damage

Attacks on shared infrastructure (internet exchange points, financial messaging networks, cloud providers) risk unintended impacts on civilian populations in third countries with no involvement in the conflict.

What Ukraine's IT Army Means for Organizational Cybersecurity in 2026

For organizations operating in 2026, the Ukraine conflict has demonstrated several principles with direct relevance to enterprise security:

Human expertise is the decisive factor

Ukraine's IT Army succeeded not because of superior technology, but because of motivated, skilled human beings coordinating effectively. This reinforces the case for investing in human cyber capability, through security awareness training and phishing simulations, as the foundation of organizational defence.

Crowdsourced threats are real and growing

The IT Army model has been studied and replicated. Pro-Russian hacktivist groups (including Killnet, NoName057(16), and Sandworm) have used similar crowdsourced coordination to target NATO governments, financial institutions, and critical infrastructure. Organizations cannot assume that only nation-state actors with vast resources pose sophisticated threats.

Threat intelligence is an operational necessity

Ukraine's conflict demonstrated how rapidly cyber threat landscapes can shift. Organizations must maintain access to real-time threat intelligence sharing to identify emerging campaigns before they reach their perimeter.

Incident response must be automated and rehearsed

When attacks come at scale and speed, manual response is insufficient. Automated incident response tools that triage, contain, and escalate threats in minutes rather than hours are essential for maintaining operational continuity under sustained attack.

For organisations building resilient cyber defences, explore:

2026 Phishing Statistics: Key Trends Every Security Team Must Know

Cybersecurity Awareness Training for Employees: 2026 Complete Guide

Using Real-World Breaches in Security Awareness Training: 2026 Playbook

Building a Security-Conscious Corporate Culture: A Roadmap for Success

Editor's Note: This article was updated on April 7, 2026.

SHARE ON

twitter
linkedin
facebook

Schedule your 30-minute demo now

You'll learn how to:
tickBuild security awareness programmes that prepare employees for nation-state and hacktivist-level social engineering attacks.
tickUse phishing simulations modelled on real cyber conflict techniques to measurably reduce human risk in your organisation.
tickLeverage Keepnet's Human Risk Management platform to detect, respond to, and recover from advanced cyber threats faster.

Frequently Asked Questions

1. What is Ukraine's IT Army and when was it formed?

arrow down

Ukraine's IT Army is a state-sanctioned, crowdsourced cyber force established on February 26, 2022, Russia's full-scale military invasion had begun just two days prior. It was announced by Mykhailo Fedorov, Ukraine's Minister of Digital Transformation, via Twitter and coordinated through a dedicated Telegram channel. The force quickly grew to over 200,000 volunteers from dozens of countries, making it the first publicly organised digital militia to conduct offensive cyber operations as a formal component of national defence in a major armed conflict.

2. What types of cyber operations has Ukraine's IT Army conducted?

arrow down

Ukraine's IT Army has conducted a wide range of operations including: Distributed Denial-of-Service (DDoS) attacks against Russian government, financial, and media websites; disruption of Russian financial payment infrastructure; targeting of critical infrastructure including power grid management and railway scheduling systems; defacement of Russian state media websites; and data exfiltration from Russian government and corporate networks. In 2024 to 2026, operations have evolved toward more sophisticated persistent access campaigns and intelligence-grade cyber operations beyond initial DDoS tactics.

3. Is it legal for citizens of other countries to participate in Ukraine's IT Army?

arrow down

The legality is complex and unresolved. International humanitarian law (IHL) does not clearly define the status of civilian hackers participating in state-directed cyber operations. Citizens of third countries participating in offensive cyber operations may face criminal liability under their own national cybercrime laws, regardless of whether Ukraine's defensive posture is considered legitimate. Several Western governments have issued informal guidance cautioning their citizens about participation, noting potential legal exposure. Anyone considering involvement should seek legal counsel in their home jurisdiction before participating.

4. What are DDoS attacks and how has Ukraine's IT Army used them?

arrow down

A Distributed Denial-of-Service (DDoS) attack overwhelms a target server or network by flooding it with traffic from many sources simultaneously, making it inaccessible to legitimate users. Ukraine's IT Army has used DDoS attacks extensively against Russian government portals (including the Kremlin and Ministry of Defence websites), financial institutions, and state media outlets. These attacks were chosen for their accessibility (participants with varying skill levels can contribute processing power) and their ability to cause immediate, visible disruption with significant symbolic and psychological impact.

5. What risks does Ukraine's IT Army model create?

arrow down

Key risks include: insider threat exposure from recruiting unvetted volunteers (state intelligence services have historically embedded agents in volunteer communities); escalation risk as attacks on Russian critical infrastructure may trigger retaliatory strikes against Western civilian systems; collateral damage to third-party systems sharing infrastructure with Russian targets; and legal jeopardy for international participants. The model also sets precedents that adversarial nations can replicate; pro-Russian hacktivist groups including Killnet and NoName057(16) have adopted similar crowdsourced coordination models to attack NATO and EU targets.

6. How has the Russia-Ukraine cyber conflict affected organisations outside the conflict zone?

arrow down

The conflict has had significant spillover effects on organisations globally. Russian state-sponsored groups and allied hacktivist collectives have targeted NATO governments, European energy companies, financial institutions, logistics providers, and media organisations in retaliation for Western support of Ukraine. Wiper malware campaigns originating from the conflict have spread to corporate networks across Europe and North America. In 2023 to 2026, organisations in critical infrastructure sectors, particularly energy, finance, and transportation, have faced elevated threat levels directly attributable to the conflict.

7. What can organisations learn from Ukraine's cyber warfare experience?

arrow down

Ukraine's experience offers several lessons for organisational cybersecurity: human expertise and motivation are decisive factors, technology alone does not determine outcomes; crowdsourced, distributed threats can be as effective as nation-state operations with vast resources; rapid coordination through accessible platforms (in Ukraine's case, Telegram) can mobilise large-scale cyber action within hours; and resilience requires both technical controls and a security-aware human layer that can recognise and respond to threats under pressure. Building a security-conscious workforce through continuous training and realistic simulations is the highest-impact defensive investment.

8. How do pro-Russian hacktivist groups like Killnet threaten Western organisations?

arrow down

Pro-Russian hacktivist groups, including Killnet, NoName057(16), and Xaknet, have adopted Ukraine's IT Army model in reverse, using Telegram channels to coordinate crowdsourced DDoS and intrusion campaigns against NATO governments, European financial institutions, healthcare systems, and critical infrastructure operators. These groups primarily conduct DDoS attacks and website defacements, but have demonstrated growing capability for more sophisticated intrusions. In 2024 to 2026, these groups have targeted organisations in Germany, France, the Netherlands, Poland, and the United Kingdom, among others. Organisations in these countries should treat hacktivist-grade DDoS capability as a baseline threat.

9. How can security awareness training help organisations defend against nation-state and hacktivist threats?

arrow down

Most cyber intrusions, including those conducted by sophisticated nation-state actors, begin with social engineering targeting employees. Phishing emails, spear-phishing campaigns, and pretexting attacks against staff are the primary initial access vectors for both state-sponsored and hacktivist threat actors. Security awareness training that uses realistic, scenario-based simulations, including those modelled on actual attack techniques used in the Russia-Ukraine conflict, builds the recognition and reporting reflexes employees need to identify and stop these attacks before they succeed. Keepnet's platform delivers adaptive, role-based training that measurably reduces human risk across organisations.

10. Is Ukraine's IT Army still active in 2026?

arrow down

Yes. As of 2026, Ukraine's IT Army remains active and continues to coordinate operations through its Telegram channel, which maintains hundreds of thousands of subscribers. The force has evolved significantly from its 2022 origins: initial large-scale DDoS campaigns have given way to more targeted, intelligence-led operations including network intrusions, data theft, and persistent access to critical Russian systems. The IT Army has also developed closer coordination with Ukraine's official cyber defence structures, including the State Service of Special Communications and Information Protection of Ukraine (SSSCIP), and has become an established component of Ukraine's hybrid warfare strategy.