HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Ukrainian Authorities Dismantle Bot Farm Supplying 20,000 Fake Telegram Accounts to Russian Intelligence

Ukrainian security services have shut down a bot farm that sold thousands of counterfeit Telegram accounts to Russian intelligence, enabling large‑scale disinformation and phishing campaigns. The takedown underscores the third‑party risk of fake‑account services for organisations that rely on messaging platforms.

LiveThreat™ Intelligence · 📅 April 22, 2026· 📰 therecord.media
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
therecord.media

Ukrainian Authorities Dismantle Bot Farm Supplying 20,000 Fake Telegram Accounts to Russian Intelligence

What Happened – Ukrainian security services arrested the organizer of a “bot farm” in Zhytomyr that created and sold thousands of counterfeit Telegram accounts using Ukrainian SIM cards. The operation supplied roughly 20 000 fake profiles to Russian intelligence for disinformation and phishing campaigns.

Why It Matters for TPRM

  • Fake‑account services can be weaponised against third‑party vendors, amplifying misinformation and social‑engineering attacks.
  • Organizations that rely on Telegram or similar messaging platforms may be exposed to credential‑based threats originating from such farms.
  • The incident highlights the risk of third‑party infrastructure (SIM‑card providers, account‑creation services) being co‑opted for hostile state‑backed operations.

Who Is Affected – Government agencies, media organisations, NGOs, and any enterprise that uses Telegram for communications or authentication.

Recommended Actions

  • Review any reliance on Telegram for critical communications or MFA and consider alternative channels.
  • Verify that employee phone numbers are not sourced from bulk‑procured SIM pools.
  • Strengthen phishing awareness training, especially around unsolicited Telegram messages.

Technical Notes – The bot farm leveraged bulk‑purchased Ukrainian mobile numbers, USB‑modem hubs, and automated scripts to mass‑create accounts. No specific CVE was involved; the threat vector is a third‑party dependency on a fraudulent account‑generation service. Source: The Record

📰 Original Source
https://therecord.media/ukraine-sbu-busts-bot-farm-supplying-russian-spies

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.