47TB exfiltrated. 10TB backups gone. Doors literally locked. This is cyber warfare, 2025 edition.
Ukraine’s GUR cyber unit , with help from the wider Ukrainian cyber community including and VO Team, just took a digital sledgehammer to Gascar Integration, one of Russia’s largest UAV (unmanned aerial vehicle) manufacturers. This wasn’t your average ransomware op. This was full-spectrum sabotage.
Let’s break it down.
What Happened?
The GUR MOU’s cyber division coordinated a precision strike on Gascar’s infrastructure. Target: sensitive drone production data, operational continuity, and physical control systems.
The result?
47+ terabytes of technical drone production documentation exfiltrated
10TB of backup data destroyed
Accounting systems: offline
Production systems: bricked
Internet access: non-functional
Internal doors: locked , staff had to evacuate via emergency exits
One insider reportedly said: “All the information was killed, to restore nothing.”
If you’ve ever worked in incident response, you know what that means. Not a compromise. A detonation. Think NotPetya, but targeted.
Why It Matters
Gascar isn’t just any contractor, they’re a strategic supplier for Russia’s drone warfare program. The theft of technical data and complete digital paralysis of the company amounts to a hard punch right where it hurts: drone deployment, production timelines, and tactical edge.
This is industrial sabotage via 21st-century means. And it wasn’t quiet. This was loud on purpose.
Tactical Takeaways
This op demonstrates the following:
Offensive cyber isn’t theory. It’s being operationalized at nation-state level, in live warzones.
Data destruction has kinetic consequences, when production halts, the battlefield feels it.
Cyber-physical crossover is real — when your internal access control is linked to your network, get ready to exit through the fire doors.
And let’s be real: this wasn’t some anonymous script kiddie in a basement. This was coordinated, informed, and surgical.
Strategic Implications
We’re seeing a shift — away from passive defense toward preemptive, asymmetric, digitally native warfare. This wasn’t just about stealing blueprints. It was about making sure those blueprints can’t be used, and telling everyone watching that you’re capable of hitting supply chains at the source.
Also: imagine what the GUR team didn’t publish.
Final Thoughts
Gascar Integration wasn’t just breached. It was flattened. This op was psychological as much as technical,a shot across the bow of every Russian defense contractor with a public IP and substandard OPSEC.
Welcome to the new front line. It’s digital, it’s ruthless, and it’s not going to be fought in silence.
📌 More on Me
• Chris Kubecka – Wikipedia
#CyberSecurity #Espionage #Iran #NationStateThreats #Hacking #OSINT #Infosec #TheHacktress #NuclearSecurity
Chris Kubecka is the founder and CEO of Hypasec NL an esteemed cyberwarfare expert, advisor to numerous governments, UN groups and freelance journalist. She is the former Aramco Head of Information Protection Group and Joint Intelligence Group, former. Distinguished Chair of the Middle East Institute, veteran USAF aviator and U.S. Space Command. She specializes in critical infrastructure security and unconventional digital threats and risks. When not getting recruited by dodgy nation-states or embroiled in cyber espionage, she hacks dictatorships (affiliate link to my book) and drinks espresso.
This is so fn awesome! Cheers!