Ukrainian Hackers Trick Russian Troops Into Revealing Starlink Coordinates
Ukrainian cyber specialists have obtained location data from more than 2,600 smuggled Starlink terminals used by Russian forces by posing as a registration service on Telegram. The information, gathered through staged requests including GPS coordinates, was passed to Ukrainian units for targeting. The operation began after SpaceX blocked unregistered Starlink devices in Ukraine at Kyiv's request.
The TimesUkrainian hackers have tricked Russian soldiers into revealing the GPS coordinates of more than 2,600 Starlink satellite receivers that had been smuggled into Russia for use on the battlefield. The receivers, brought in via Central Asia, Turkey and the Middle East, allowed Russian forces to control attack drones over longer ranges with greater accuracy and to use real-time battlefield mapping.
The operation unfolded in early February as Russian units attempted to infiltrate Ukrainian positions near Zaporizhzhia under cover of fog and poor weather. Russian troops had advanced to within 12 miles of Zaporizhzhia city after moving through the Kakhovka floodplain.
Yaro, an intelligence officer with the 128th Heavy Mechanised Brigade fighting near the village of Plavni, said the enemy was attempting to move infantry between Ukrainian positions during periods of poor weather. Access to Starlink had become important for Russian operations.
"Since 2025 they started to use Starlinks to control their big drones and give a higher precision for the attacks, give them an advantage to bypass our anti-drone systems," said Goldfinger, a wounded soldier turned hacker for Ukraine’s 256 Cyber Assault Division.
Kyiv asked SpaceX to require registration for Starlink terminals used in Ukraine. The company required users to visit an authorised service centre in unoccupied territory and present a passport. Unregistered devices were then blocked, leaving Russian units without the service they had come to rely on.
Russian soldiers began seeking Ukrainians willing to register their terminals for payment. The 256 Cyber Assault Division created a Telegram channel that posed as a criminal service offering to register Russian Starlinks as Ukrainian in exchange for cryptocurrency.
Operators used an AI chatbot to collect information in stages, beginning with serial numbers and ending with requests for GPS coordinates. The data revealed the locations of Russian headquarters, command posts and drone operator positions. The hackers provided the coordinates to Ukraine’s Ministry of Defence and directly to brigades operating in the relevant areas.
Yaro’s unit received one such set of coordinates. After mapping them against reconnaissance imagery, the officer identified a sheltered position marked by fresh tracks and rubbish. A strike drone later hit the structure. Camera footage from the drone showed a satellite dish on the roof, angled toward a neighbouring village rather than the sky.
Russian forces have since begun using Starlink dishes to create wifi bridges between units. The tactic enables communications but also makes positions easier for Ukrainian forces to identify. Yaro said Russian troops often remain in compromised locations because the soldier who provided the coordinates is reluctant to report the mistake or because movement near the front line is difficult.
Katerina, a 24-year-old drone pilot with the brigade who is four months pregnant, launches heavy bomber drones toward Russian positions daily. She joined the armed forces after her village was liberated in the first year of the war. During the week a Times reporter visited the 128th Brigade, drone strikes continued at a high pace with new targeting information arriving daily.
The 256 Cyber Assault Division consists of civilian cyber specialists. Hackers operating under call signs including Chester, Goldfinger, Scott and Chris gathered the Starlink data. The information was used both for immediate strikes and to build a broader picture of Russian deployments in the Zaporizhzhia, Donbas and other sectors where Ukrainian forces have faced pressure.
Russian advances were reported near Hulyaipole and in the Donbas cities of Pokrovsk, Myrnohrad and Lyman at the time the operation began. The loss of Starlink occurred at the end of an intense period of Russian bombing and winter blackouts.
Key Facts
Story Timeline
5 events- Early February 2026
Russian units advanced near Zaporizhzhia using smuggled Starlink terminals.
1 sourceThe Times - 2025
Russian forces began using Starlink for drone control and battlefield mapping.
1 sourceThe Times - After February 2026
SpaceX required registration and blocked unregistered Starlink devices in Ukraine.
1 sourceThe Times - 2026
Ukrainian 256 Cyber Assault Division created fake Telegram channel to collect coordinates from over 2,600 devices.
1 sourceThe Times - May 2026
The Times visited the 128th Brigade where strikes using the intelligence continued daily.
1 sourceThe Times
Potential Impact
- 01
Russian units lost encrypted communications and drone control after unregistered Starlinks were blocked.
- 02
Ukrainian brigades conducted strikes on headquarters and drone positions using coordinates from the operation.
- 03
The 128th Brigade integrated the intelligence into daily drone strike operations near Zaporizhzhia.
- 04
Russian forces began using satellite dishes for wifi bridges that Ukrainian units can visually identify.
Transparency Panel
Related Stories
forbes.comNGA Director Announces New AI Framework and Launches Rapid Capabilities Office
Lt. Gen. Michelle Bredenkamp outlined the agency's blueprint for becoming an AI-first organization in her first major speech since taking charge in November 2025. The National Geospatial-Intelligence Agency is finalizing the framework to align with the Department of Defense AI st…
Substrate placeholder — needs reviewApple and Intel Reach Preliminary Chip Manufacturing Agreement
Intel shares surged more than 15 percent after The Wall Street Journal reported the agreement on May 8, 2026. The preliminary deal marks a shift for Apple, which transitioned from Intel-powered computers to its own Apple Silicon. Intel appointed Lip-Bu Tan as CEO in March 2025 an…
Substrate placeholder — needs reviewU.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone Programs
The Treasury Department announced sanctions Friday targeting 10 more individuals and companies enabling Iran's military supply chain. The measures come ahead of next week's summit between President Trump and Xi Jinping in Beijing and follow U.S. strikes on two Iranian oil tankers…