Unmasking the Actors Behind Russian Intelligence-Linked Phishing Operations

Joint investigation with Aleksandr Litreev – a cybersecurity researcher, founder of intelligence data platform OSEENT.

Executive Summary

We identified the individual behind a phishing campaign that targets Ukraine sympathizers in Russia with high confidence as Aleksandr Ostaenkov, a 25-years old from Polevskoy, Sverdlovskaya oblast', Russia.

Aleksandr Ostaenkov operates several phishing websites and Telegram channels/bots impersonating Freedom of Russia Legion (Ukrainian Armed Forces unit consisting of Russians) and I Want To Live (a helpline of Ukrainian Military Intelligence for Russians).

Although there is no direct evidence, we assess that Ostaenkov collaborates with Russian intelligence services and/or law enforcement forwarding the information obtained via phishing to them.

Background

Malfors has been tracking a large-scale impersonation campaign linked to the Russian intelligence services since August 2024.

The campaign targets Ukraine and the West sympathizers in Russia with a set of phishing websites, Telegram channels, and bots that impersonate Ukrainian Armed Forces units, Ukrainian Intelligence projects, the CIA, and other organizations. The objective of the campaign is to catch and retaliate Russian citizens not loyal to the regime.

A detailed report by SilentPush, in collaboration with Malfors, has been published earlier on this campaign: silentpush.com/blog/russian-intelligence-phishing/.

Earlier, we have also published 60+ domains we identified that are a part of this campaign. Impersonated organizations include:

The campaign started in 2023 and remains active as of May 2025.

Initial Findings

While conducting a routine check of newly registered domains that might be affiliated with the campaign, we identified a new suspicious domain: legionliberty[.]space.

legionliberty[.]space points to 87.120.117[.]52 which belonged to AS401115 (Ekabi LLC):

RIPE routing data for 87.120.117.52
https://stat.ripe.net/resource/87.120.117.52#tab=routing

AS401115 (Ekabi LLC) is a well-known bulletproof hosting indicating a malicious intent.

URLhaus ASN report for AS401115
https://urlhaus.abuse.ch/asn/401115

Ekabi's only upstream, AS401110 (Sovy Cloud Services LLC), has been disconnected from its upstreams for ignoring abuse reports and hosting malicious activity.

Previously, we observed a different phishing website of this campaign hosted at AS401120 (cheapy.host LLC) whose single upstream is also AS401110 (Sovy Cloud Services LLC) – rusvolcorps[.]net at 196.251.84[.]42AS401120 (cheapy.host LLC).

Though, we weren't able to confirm the relation between legionliberty[.]space and rusvolcorps[.]net, yet.

Details Exposure via WHOIS

We check WHOIS data as a standard procedure of handling malicious domains. legionliberty[.]space is registered with Russian registrar REG[.]RU and exposes the following potentially useful data about the domain owner:

FieldValue
Admin Phone+7.9506338899
Admin Emailillegalmercy92@gmail.com

Registrars, including REG.RU, are obliged to require email confirmation to register domains in gTLD, so Admin Email has to be an existing email.

Usually, we see random contact details, emails are usually registered just for the domain registration and never re-used. This time it was different.

Intelligence X search results for phone number +79506338899
Phone number from WHOIS appears in known breaches
Gmail compose window showing avatar for illegalmercy92@gmail.com
Gmail exposes user avatar of the WHOIS contact email

Identification

Seeing clear indications that details exposed in WHOIS might be used by a real person, we decided to dive deeper in an attempt to identify them.

illegalmercy92@gmail.com is nowhere to be found in open sources; however, we quickly find a person using a very similar username: "illegalmercy":

Google Search results for 'illegalmercy' showing GitHub and Firefox profiles
Google Search results for "illegalmercy"

From Google Search, we found out that "IllegalMercy" published a Firefox extension to listen for Lo-Fi music. The Firefox developer's profile has exactly same picture as we have seen in Gmail earlier:

Firefox Add-ons developer profile for illegalMercy
https://addons.mozilla.org/en-US/firefox/user/17367180/

With this information, we are much more confident that "IllegalMercy" username is in use by the same person who owns illegalmercy92@gmail.com email, but keep looking for confirmations.

From Firefox developer contact's section we extract another email of the person: quppson@yandex.ru.

The Github account with the same username hosts the code of the above mentioned Firefox extension:

GitHub profile for Alexander Ostaenkov (illegalMercy)
https://github.com/illegalMercy

We extract the following information from that Github account:

FieldValue
Full nameAlexander Ostaenkov
Emailal.ostaenkov@gmail.com
LocationRussia, Yekaterinburg
Telegram@illegalMercy

Note that the phone number from WHOIS has a region code of Sverdlovsk oblast (the region where Yekaterinburg is located). With this information, we are looking for more evidence that illegalmercy92@gmail.com indeed belongs to Ostaenkov.

Additional Confirmations

We were able to find a Trello account registered with illegalmercy92@gmail.com. Trello performs a lookup of a Trello user by email when inviting one to a board, exposing profile details:

Trello API response showing user profile for illegalmercy92@gmail.com
Trello lookup result by illegalmercy92@gmail.com

Full name of the account is "illegal Mercy" with lowercase "i" and capital "M" – consistent with other accounts that belong to Aleksandr.

Also, the account was last active in January 2023 – almost 2 years before the first phishing website managed by Aleksandr came up.

Via OSEENT platform, we verified that the phone number exposed in WHOIS (+7.9506338899) appears in publicly available breached data and belongs to Aleksandr:

OSEENT platform showing breached data confirming Aleksandr's identity
Publicly breached data confirms name, phone number, residential location in Yekaterinburg of Aleksandr

Despite all the evidence, we have to note that we were not able to fully rule out a false flag operation. Although highly unlikely, a sophisticated actor is theoretically able to frame Aleksandr and act on his behalf.

More Phishing Infrastructure

Having confirmed the actor, we are looking for more phishing infrastructure that the actor has managed. Starting point is malicious domain legionliberty[.]space and its IP address 87.120.117[.]52.

Malfors platform showing domains hosted on 87.120.117.52

Pivoting on the IP address returns another domain: hochuzhit[.]tech

"Hochu Zhit" is a transliteration of "Хочу Жить" (I Want To Live) – a helpline for surrendering Russian servicemen operated by the Ukrainian Military Intelligence.

We have already seen several "Hochu Zhit" impersonations within this campaign, this one is a new one. hochuzhit[.]tech's WHOIS returns the same contact details confirming that it is indeed the same actor.

We were not able to confirm that either of two domains ever hosted phishing content. Past scans on Urlscan.io indicate that the domains redirected to legitimate websites of Freedom of Russian Legion and Hochu Zhit.

However, quick Google Search of the domain names reveals fake Telegram channels impersonating legitimate ones.

Fake Telegram channel impersonating Freedom of Russia Legion
Fake Telegram channel of Freedom of Russia Legion
Fake Telegram channel impersonating Hochu Zhit
Fake Telegram channel of Hochu Zhit

Those channels are auto-posting content of legitimate channels while replacing legitimate contact details. Bio and posts link to fake Telegram bots impersonating legitimate Telegram bots of the respective organizations.

Actor's Profile

Aleksandr Ostaenkov behaves cautiously in the digital space. His online presence is minimal, he uses made up aliases in social media, and never posts photos of himself.

For example, his profile on the social network VK.com changed its name from his real one to "Контент Уехал", which is translated as "Content has left".

Aleksandr's VK.com profile showing alias 'Контент Уехал'
Aleksandr's VK.com profile: https://vk.com/id220540855

The account uses the familiar username "illegalmercy."; the date of birth matches Aleksandr's data from publicly available leaks. The profile also states that he lives in the city of Polevskoy and has an interest in Retrowave/Synthwave music.

Aleksandr's profile also states that he graduated from South Ural State University with a degree in "Fundamental Informatics and Information Technologies," studying at the Faculty of the Higher School of Electronics and Computer Science.

We have also identified Aleksandr's parents – Valentina Ostaenkova and Aleksandr Ostaenkov (Sr.).

Father's VK.com friends list showing connection to Aleksandr
Father's VK.com list of friends: https://vk.com/friends?id=349490538&section=all
Mother's VK.com friends list showing connection to Aleksandr
Mother's VK.com list of friends: https://vk.com/friends?id=340006292&section=all

We confirmed the relationship by numerous photos together that the family members posted publicly. We are not including those photos in the report to respect privacy of uninvolved relatives and Ostaenkov being a minor on them.

We also found Aleksandr's father's profile on another popular Russian social network, Odnoklassniki. There, he is a member of groups related to the Russian military.

Father's Odnoklassniki profile showing military group memberships
Aleksandr Ostaenkov (Sr.) Odnoklassniki profile: https://ok.ru/profile/452371886441

Some groups are very specific, for example, he is a member of groups for former crew members of specific ballistic missile submarines (SSBN), which are a part of the Russian nuclear triad. Ostaenkov (Sr.) also has several friends who identify themselves as former or active duty officers of Russian Army and Law Enforcement.

This indicates a pro-regime stance of the Ostaenkov family and confirms close connections with Russian military and law enforcement.

Summary

We identified two Telegram channels (~4,000 subscribers combined), two Telegram bots, and two websites that make up the phishing campaign impersonating Hochu Zhit and Freedom of Russia Legion.

We were able to identify and are highly confident about the person behind it – Aleksandr Ostaenkov, a 25-years old from Russia.

No connections between Ostaenkov and the rest of the campaign were found yet.

Link analysis diagram showing connections between Aleksandr's infrastructure
Aleksandr's campaign visualized

Indicators

IndicatorDescription
hochuzhit[.]techPhishing website impersonating Hochu Zhit
legionliberty[.]spacePhishing website impersonating Freedom of Russia Legion
87.120.117[.]52IP of phishing websites
t.me/hochu_zhyt_officalFake Hochu Zhit Telegram channel
t.me/legionoffreedom_officalFake Freedom of Russia Legion Telegram bot
t.me/spasisebya_offical_botFake Hochu Zhit Telegram bot
t.me/legionoffreedom_offical_botFake Freedom of Russia Legion Telegram bot
dvizheneeSR@proton.meFake Freedom of Russia Legion email address