
Russia Uses Slovak Servers to Target Ukrainian Soldiers, Investigation Discovers
Russian websites are reportedly using servers based in Slovakia to conduct a large-scale campaign against Ukrainian military personnel. This includes publishing personal data and inciting harassment.
The findings come from an investigation by the Ján Kuciak Investigative Center, as reported by Aktuality.sk.
According to the investigation, the campaign aims to publicly shame, intimidate, and facilitate the harassment of Ukrainian soldiers — a tactic commonly known online as “doxxing.”
According to investigators, these websites publish confidential information not only about Ukrainian military personnel and their family members but also about public figures from Ukraine, Slovakia, Poland, the Czech Republic, and Hungary.
The technical company identified as a partner of these Russian websites is StormWall, a commercial hosting firm reportedly operating out of Bratislava and owned by Russian nationals.
Investigators say StormWall provides hosting and other technical services not only to specific doxxing platforms but also to one of the key Russian propaganda outlets – the website NewsFront.
Among the tools used by the Russians are specially created websites and a so-called “doxxing Wikipedia,” where the invaders systematically publish personal data of soldiers, activists, politicians, and the families of fallen or captured Ukrainians.
According to investigators, this activity is part of a broader information and psychological warfare campaign that Russia is waging against Ukraine, as well as against activists and politicians from other European countries who oppose Kremlin aggression.
GRU Hackers
Previously, journalists from The Insider uncovered a team of hackers linked to Military Unit 29155 of the Main Directorate of the General Staff of the Russian Armed Forces – better known by its former abbreviation, GRU.
Because the hackers’ server was found to be virtually unprotected, investigators were able to obtain a complete list of GRU targets — ranging from Ukrainian state-owned companies to infrastructure sites across Europe, a Qatari bank, and even medical clinics around the world.
By analyzing phone calls, travel records, and correspondence, journalists identified dozens of individuals involved in the group.
Among them were convicted carding hackers, recent university graduates, and GRU sabotage veterans with no prior experience in the IT field.