Event 1150

processed admin_quick Updated 2025-11-29T15:22:35.659920+00:00
Status: processed Confidence: Category: Country: Poland Country: Russia Attack Type: Where: Source: admin_quick URL: https://militarnyi.com/en/news/russian-suspected-of-cyberattacks-on-polish-and-eu-companies-detained-in-krakow/ 🔗 Archive: Archive failed (2 attempts)
🕐 Event Time: 2025-11-16T00:00:00Z
Created: 2025-11-29T15:18:50.591268+00:00
✏️ Updated: 2025-11-29T15:22:35.659920+00:00
Checking requirements...

Summary

Short Summary: Russian citizen detained in Krakow for suspected cyberattacks on Polish and EU companies.

Extended Summary: On November 16, 2025, Polish authorities detained a 23-year-old Russian man in Krakow suspected of interfering with the IT infrastructure of multiple Polish and European firms. The individual, who also worked as a truck driver, allegedly breached an online retailer's systems, modifying databases which could have seriously disrupted business and threatened customer data security. Investigators discovered some hacking activities were conducted from the restroom of his truck during his travels across Europe. The Central Bureau for Combating Cybercrime (CBZC) is examining possible links to other cyberattacks across the EU, signaling a broader campaign. The suspect had entered Poland illegally in 2022 and obtained refugee status in 2023. Authorities continue investigations, with additional arrests and charges not ruled out. Polish Interior Minister Marcin Kierwinski publicly confirmed the case, underscoring its significance for national cybersecurity. The suspect remains in custody following a court order for three months of pretrial detention.

Description and Notes

A 23-year-old Russian citizen was detained in Krakow, Poland, on November 16, 2025, suspected of conducting cyberattacks on Polish and European companies. The suspect, who worked as a truck driver, allegedly hacked into the IT systems of an online retailer, altering database structures and compromising business operations and customer data security. Some attacks were reportedly carried out from the restroom of his truck while traveling around Europe. Authorities are investigating ties to other cyber incidents in Poland and EU countries, with potential further arrests and charges anticipated. The suspect was granted refugee status in Poland in 2023 after illegally crossing the border in 2022. Polish Minister of the Interior Marcin Kierwinski confirmed the facts, and the suspect has been ordered held in pretrial detention for three months.

Evidence

Location

Countries: Poland Russia

Location: Krakow

Follow-up / Investigation

Country Status Link Notes
Poland Investigation

Review & Decision

Brief note explaining the decision. Review note is required.
Optional. Mark if source authenticity has been verified.
Review the event and choose an action below.

Payload History

Loading history...

Re-enrichment

Re-enrich

Enrichment-only: keeps existing processed data, screenshots, and media. Re-runs only the enrichment step (AI extraction) without refetching the source or regenerating screenshots. Use this if enrichment failed or you need updated AI-extracted data.

Destructive Actions

Reprocess

Full rebuild: discards processed data, refetches source, regenerates screenshots/media, and re-enriches. Reset to pending and rerun the full pipeline from the raw payload. This will discard the current processed data, refetch the source, regenerate screenshots/media, and re-enrich from scratch. Use this if processing failed or you need a full rebuild.

Delete Event

⚠️ Warning: This permanently removes the event and its history. This action cannot be undone.