All cases

Kyivstar Telecommunications Attack

December 2023

DestructivePeak: DestructionAttribution: ConfirmedTelecommunicationsCritical Infrastructure
Year
2023
Actor country
Russia
Target regions
Ukraine
Unpeace score
10

Executive Summary

Sandworm attack destroying the core network of Kyivstar, Ukraine's largest mobile operator serving approximately 24 million subscribers. The attack wiped network infrastructure and disrupted mobile communications, internet access, and air-raid alert systems across Ukraine for several days during active conflict.

Why This Matters

Kyivstar represented the most destructive cyber attack against a telecommunications provider during active conflict, demonstrating ICS-equivalent destructive capability against civilian communication infrastructure and disrupting life-safety warning systems.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2023-05
Intrusion

Network pre-positioning

Sandworm established access to Kyivstar's internal infrastructure months before the destructive phase.

2023-12-12
Destruction

Core network destruction

Wiper malware destroyed core network equipment including virtualization infrastructure, rendering the entire mobile network inoperable.

2023-12-12
Strategic Impact

Cascading civilian impact

24 million subscribers lost mobile service; air-raid alert systems disrupted during active Russian missile campaigns; banking systems relying on SMS authentication affected.

Threshold Crossings

  • Largest cyber attack on a telecommunications company during an active armed conflict
  • Disrupted civilian emergency warning systems during wartime missile campaigns

Restraint Factors

  • Attack targeted a single operator, not all Ukrainian telecoms simultaneously
  • Service was restored within days through emergency measures

Attribution Assessment

ConfirmedSandworm Team, attributed by Ukraine's SBU to Russia's GRU
Russia
SandwormVoodoo BearIRIDIUMSeashell Blizzard
1. Technical

Threat actor mapped to Russia based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: Kyivstar: Statement on cyber attack and service restoration

2. Political / Legal
Public Attribution
  • Ukraine SBU formal attribution to Sandworm (GRU)
  • Allied governments cited Kyivstar in documentation of Russian wartime cyber operations
  • Emergency telecommunications support from allied nations

Sources: Ukraine SBU: Sandworm responsible for Kyivstar attack

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

Confirmed” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

10

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak5/6
Threshold crossings2/4
Governance flags3/8
Sectors affected2/6
Entanglement4/10
Country scope1/6

Coercive Function

Destructive

Destruction of data or systems — coercive value through denial, punishment, or deterrence signaling.

Observed coercive effects

  • Largest cyber attack on a telecommunications company during an active armed conflict
  • Disrupted civilian emergency warning systems during wartime missile campaigns

Entanglement Risk

Entanglement score4

Sectors affected

TelecommunicationsCritical Infrastructure

Countries / regions

Ukraine

Impact summary

Core mobile network destroyed; 24 million subscribers affected; air-raid alerts and banking disrupted for days.

Infrastructure Meaning

Malware / tooling

Solntsepyok wiper

Capability profile

Core mobile network destroyed; 24 million subscribers affected; air-raid alerts and banking disrupted for days.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • IHL prohibition on targeting civilian communication infrastructure during armed conflict
  • UN GGE 2015 norm against damaging critical infrastructure

Policy responses

  • Ukraine SBU formal attribution to Sandworm (GRU)
  • Allied governments cited Kyivstar in documentation of Russian wartime cyber operations
  • Emergency telecommunications support from allied nations

Regulatory changes

  • Ukraine accelerated telecom infrastructure resilience and redundancy measures
  • Informed EU NIS2 implementation for telecommunications operators

Governance impact assessment

Demonstrated that cyber operations can achieve telecommunications-equivalent effects to kinetic strikes against civilian infrastructure during armed conflict, strengthening the case for applying IHL to wartime cyber operations against civilian communications.

Sources

G

Ukraine SBU: Sandworm responsible for Kyivstar attack

Government2024-01-04
V

Kyivstar: Statement on cyber attack and service restoration

Vendor Report2023-12-12

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.