Secret trove offers rare look into Russian cyberwar ambitions

More than 5,000 pages of documents from a Moscow-based contractor offer unusual glimpses into planning and training for security services, including the notorious hacking group Sandworm

and 
March 30, 2023 at 11:00 a.m. EDT
The leak of documents from a Moscow-based defense contractor is unusual for Russia’s secretive military industrial complex. (Washington Post illustration, NTC Vulkan; iStock)
16 min

Russian intelligence agencies worked with a Moscow-based defense contractor to strengthen their ability to launch cyberattacks, sow disinformation and surveil sections of the internet, according to thousands of pages of confidential corporate documents.

The documents detail a suite of computer programs and databases that would allow Russia’s intelligence agencies and hacking groups to better find vulnerabilities, coordinate attacks and control online activity. The documents suggest the firm was supporting operations including both social media disinformation and training to remotely disrupt real-world targets, such as sea, air and rail control systems.

About the Vulkan Files

This investigation was a collaboration among journalists from eight countries working at 11 news organizations, including The Washington Post. Leading the project were Paper Trail Media and Der Spiegel in Germany. Also participating from that country were Süddeutsche Zeitung and ZDF. Other partners include the Guardian in Britain, Le Monde in France, Tamedia in Switzerland, the Danish Broadcasting Corporation in Denmark, Der Standard in Austria and iStories, a news site covering Russia that is based in Latvia.

Editing by Ben Pauker. Copy editing by Gilbert Dunkley.