Press "Enter" to skip to content

Russian Hackers Disrupt Ukrainian Global Lecture on Kremlin Propaganda

A global online lecture hosted by the Ukrainian World Congress (UWC) was attacked by pro-Russian hackers in an attempt to silence discussion aimed at debunking Kremlin propaganda. The event, held on 6 April, was part of a wider educational project intended to expose and challenge persistent disinformation from Moscow.

The lecture, titled “Medievalophobia: Why are Russians afraid of the memory of King Daniel Romanovych?”, had attracted interest from audiences in over 40 countries. Organisers say that the session was disrupted when hackers hijacked the virtual platform. They played the Russian national anthem, used vulgar and offensive language, flooded the chat with abuse, and even changed their usernames to “fsb rf” — a clear reference to Russia’s Federal Security Service.

The attack forced organisers and attendees to move the session to an alternative secure platform. Despite this disruption, the event continued, though some participants were unable to reconnect due to the interruption.

This incident is part of a wider escalation in cyber aggression. Ukraine’s State Service of Special Communications and Information Protection, along with CERT-UA, has reported a sharp increase in Russian cyberattacks targeting organisations involved in Ukraine’s defence innovation sector since February 2025.

Cyberattack Incident Summary
Date of Attack: 6 April 2025
Event Targeted: Educational lecture by Ukrainian World Congress
Lecture Topic: Myths of Russian propaganda, historical memory
Attack Method: Russian anthem, profanity, chat disruption
Suspected Hackers: Pro-Russian group, usernames referencing FSB
Participants Affected: Over 40 countries’ representatives
Response: Event moved to a secure platform

This cyber assault adds to a growing pattern of Russian digital interference intended to suppress independent historical discourse and obstruct Ukraine’s efforts to educate international audiences about the Kremlin’s disinformation operations.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *