Substrate
technology

Ukrainian Hackers Trick Russian Troops Into Revealing Starlink Coordinates

Ukrainian cyber specialists have obtained location data from more than 2,600 smuggled Starlink terminals used by Russian forces by posing as a registration service on Telegram. The information, gathered through staged requests including GPS coordinates, was passed to Ukrainian units for targeting. The operation began after SpaceX blocked unregistered Starlink devices in Ukraine at Kyiv's request.

The Times
1 source·May 6, 10:54 AM(2 days ago)·3m read
|
Ukrainian Hackers Trick Russian Troops Into Revealing Starlink CoordinatesThe Times
Audio version
Tap play to generate a narrated version.
Developing·Limited corroboration so far. This page will refresh as more sources emerge.

Ukrainian hackers have tricked Russian soldiers into revealing the GPS coordinates of more than 2,600 Starlink satellite receivers that had been smuggled into Russia for use on the battlefield. The receivers, brought in via Central Asia, Turkey and the Middle East, allowed Russian forces to control attack drones over longer ranges with greater accuracy and to use real-time battlefield mapping.

The operation unfolded in early February as Russian units attempted to infiltrate Ukrainian positions near Zaporizhzhia under cover of fog and poor weather. Russian troops had advanced to within 12 miles of Zaporizhzhia city after moving through the Kakhovka floodplain.

Yaro, an intelligence officer with the 128th Heavy Mechanised Brigade fighting near the village of Plavni, said the enemy was attempting to move infantry between Ukrainian positions during periods of poor weather. Access to Starlink had become important for Russian operations.

"Since 2025 they started to use Starlinks to control their big drones and give a higher precision for the attacks, give them an advantage to bypass our anti-drone systems," said Goldfinger, a wounded soldier turned hacker for Ukraine’s 256 Cyber Assault Division.

Kyiv asked SpaceX to require registration for Starlink terminals used in Ukraine. The company required users to visit an authorised service centre in unoccupied territory and present a passport. Unregistered devices were then blocked, leaving Russian units without the service they had come to rely on.

Russian soldiers began seeking Ukrainians willing to register their terminals for payment. The 256 Cyber Assault Division created a Telegram channel that posed as a criminal service offering to register Russian Starlinks as Ukrainian in exchange for cryptocurrency.

Operators used an AI chatbot to collect information in stages, beginning with serial numbers and ending with requests for GPS coordinates. The data revealed the locations of Russian headquarters, command posts and drone operator positions. The hackers provided the coordinates to Ukraine’s Ministry of Defence and directly to brigades operating in the relevant areas.

Yaro’s unit received one such set of coordinates. After mapping them against reconnaissance imagery, the officer identified a sheltered position marked by fresh tracks and rubbish. A strike drone later hit the structure. Camera footage from the drone showed a satellite dish on the roof, angled toward a neighbouring village rather than the sky.

Russian forces have since begun using Starlink dishes to create wifi bridges between units. The tactic enables communications but also makes positions easier for Ukrainian forces to identify. Yaro said Russian troops often remain in compromised locations because the soldier who provided the coordinates is reluctant to report the mistake or because movement near the front line is difficult.

Katerina, a 24-year-old drone pilot with the brigade who is four months pregnant, launches heavy bomber drones toward Russian positions daily. She joined the armed forces after her village was liberated in the first year of the war. During the week a Times reporter visited the 128th Brigade, drone strikes continued at a high pace with new targeting information arriving daily.

The 256 Cyber Assault Division consists of civilian cyber specialists. Hackers operating under call signs including Chester, Goldfinger, Scott and Chris gathered the Starlink data. The information was used both for immediate strikes and to build a broader picture of Russian deployments in the Zaporizhzhia, Donbas and other sectors where Ukrainian forces have faced pressure.

Russian advances were reported near Hulyaipole and in the Donbas cities of Pokrovsk, Myrnohrad and Lyman at the time the operation began. The loss of Starlink occurred at the end of an intense period of Russian bombing and winter blackouts.

Key Facts

More than 2,600
Starlink receivers tricked into revealing GPS data
256 Cyber Assault Division
Ukrainian civilian hackers ran the Telegram operation
SpaceX registration
Required passport at service centres in unoccupied Ukraine
Zaporizhzhia region
Russian units advanced within 12 miles of city
Goldfinger
Wounded soldier turned hacker in 256 Division

Story Timeline

5 events
  1. Early February 2026

    Russian units advanced near Zaporizhzhia using smuggled Starlink terminals.

    1 sourceThe Times
  2. 2025

    Russian forces began using Starlink for drone control and battlefield mapping.

    1 sourceThe Times
  3. After February 2026

    SpaceX required registration and blocked unregistered Starlink devices in Ukraine.

    1 sourceThe Times
  4. 2026

    Ukrainian 256 Cyber Assault Division created fake Telegram channel to collect coordinates from over 2,600 devices.

    1 sourceThe Times
  5. May 2026

    The Times visited the 128th Brigade where strikes using the intelligence continued daily.

    1 sourceThe Times

Potential Impact

  1. 01

    Russian units lost encrypted communications and drone control after unregistered Starlinks were blocked.

  2. 02

    Ukrainian brigades conducted strikes on headquarters and drone positions using coordinates from the operation.

  3. 03

    The 128th Brigade integrated the intelligence into daily drone strike operations near Zaporizhzhia.

  4. 04

    Russian forces began using satellite dishes for wifi bridges that Ukrainian units can visually identify.

Transparency Panel

Sources cross-referenced1
Confidence score65%
Synthesized bySubstrate AI
Word count593 words
PublishedMay 6, 2026, 10:54 AM
Bias signals removed3 across 2 outlets
Signal Breakdown
Loaded 1Editorializing 1Amplifying 1

Related Stories

NGA Director Announces New AI Framework and Launches Rapid Capabilities Officeforbes.com
ai51 min ago

NGA Director Announces New AI Framework and Launches Rapid Capabilities Office

Lt. Gen. Michelle Bredenkamp outlined the agency's blueprint for becoming an AI-first organization in her first major speech since taking charge in November 2025. The National Geospatial-Intelligence Agency is finalizing the framework to align with the Department of Defense AI st…

forbes.com
Variety
Breaking Defense
3 sources
Apple and Intel Reach Preliminary Chip Manufacturing AgreementSubstrate placeholder — needs review
technology2 hrs agoUpdated

Apple and Intel Reach Preliminary Chip Manufacturing Agreement

Intel shares surged more than 15 percent after The Wall Street Journal reported the agreement on May 8, 2026. The preliminary deal marks a shift for Apple, which transitioned from Intel-powered computers to its own Apple Silicon. Intel appointed Lip-Bu Tan as CEO in March 2025 an…

cnbc.com
WA
Coindesk
The Verge
KO
+2
7 sources
U.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone ProgramsSubstrate placeholder — needs review
technology8 hrs agoFraming55Framing risk55/100Rewrite inherits lede misdirection and consensus framing by centering the U.S. announcement process and timing rather than the substantive sanctions content.Click to jump to full framing analysis

U.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone Programs

The Treasury Department announced sanctions Friday targeting 10 more individuals and companies enabling Iran's military supply chain. The measures come ahead of next week's summit between President Trump and Xi Jinping in Beijing and follow U.S. strikes on two Iranian oil tankers…

The New York Times
MA
SA
TechCrunch
4 sources