Federal prosecutors charged a Ukrainian woman and a suspected Russian military intelligence officer Thursday with orchestrating cyberattacks that contaminated water supplies, disrupted food processing operations, and compromised election networks across multiple states.
The indictment, filed in the Central District of California, names Victoria Dubranova, a Ukrainian national, and an individual using the alias “Cyber_1ce_Killer” — whom authorities link to Russia’s GRU military intelligence agency. Prosecutors redacted several additional defendants’ identities in sealed portions of the charging document.
New: The U.S. has unsealed a California grand jury indictment exposing how Russian GRU hackers targeted critical infrastructure in the U.S. They hit a regional airport in Missouri, drinking water and water storage facilities in Texas, Pennsylvania and Indiana, and a meat packing… pic.twitter.com/W3JwsrGMCl
— Michael Weiss (@michaeldweiss) December 11, 2025
Authorities allege the defendants operated through CyberArmyofRussia_Reborn, a hacking collective advancing Moscow’s strategic objectives. The conspiracy began in November 2022 and continues through the present, according to prosecutors.
The group’s most destructive attack struck a California meat processing plant in Vernon on November 1, 2024. Hackers disabled cooling systems, destroyed thousands of pounds of product, and caused a hazardous chemical release that shuttered operations for hours, court documents state.
Prosecutors documented repeated breaches of water infrastructure in Texas and Indiana. In one January 2024 attack, intruders manipulated well controls at a Texas facility, flooding the system with drinking water. Another intrusion altered chemical injection rates at the water treatment equipment.
Federal authorities tracked attacks on election administration sites in Florida during the 2024 campaign, energy infrastructure in Colorado and Oklahoma, and recreational facilities abroad. At a Netherlands aquatic center, hackers tampered with chlorination controls, prosecutors charge.
Court filings describe Dubranova as the group’s propagandist. She produced videos celebrating the attacks for distribution on Telegram, where the organization cultivated a following exceeding 75,000 subscribers. The network included more than 100 active participants at its peak, some juveniles, according to the indictment.
Internal communications reveal coordination with Russian intelligence services. Members identified one participant as working for the FSB, Russia’s domestic security agency. Messages show another conspirator arranged Dubranova’s potential escape route through Belarus with assistance from Russian authorities.
The defendant known as Cyber_1ce_Killer financed the operation, prosecutors allege. He paid for attack tools and directed the selection of targets.
The defendants face charges including conspiracy, computer fraud, and identity theft. The government also seeks forfeiture of any assets connected to the scheme.
Information for this story was found via the sources and companies mentioned. The author has no securities or affiliations related to the organizations discussed. Not a recommendation to buy or sell. Always do additional research and consult a professional before purchasing a security. The author holds no licenses.