Finland Arrests Two in Probe of Damaged Undersea Telecom Cable

Two Arrested in Finland as Investigation into Damaged Baltic Sea Telecom Cable Points to Sabotage

HIGH
January 3, 2026
5m read
CyberattackIndustrial Control SystemsThreat Intelligence

Related Entities

Organizations

Finnish Border Guard

Other

Elisa FinlandEstoniaRussia

MITRE ATT&CK Techniques

Full Report

Executive Summary

Finnish police have arrested two crew members of the cargo vessel "Fitburg" as part of a criminal investigation into a damaged undersea telecommunications cable in the Gulf of Finland. The Elisa-owned cable, a critical link between Finland and Estonia, was damaged around New Year's Eve 2025. The vessel, which was traveling from Russia to Israel, was intercepted after it was observed dragging its anchor over the cable's location at the time of the disruption. The incident is being investigated as aggravated criminal damage and potential sabotage, amplifying concerns across Europe about the vulnerability of critical subsea infrastructure to hybrid warfare tactics, particularly in the tense geopolitical climate of the Baltic Sea.

Threat Overview

The incident represents a physical attack on critical digital infrastructure. While the immediate cause appears to be a ship's anchor, the context raises strong suspicions of deliberate action. The Gulf of Finland is a shallow, crowded waterway, but the coincidence of a ship dragging its anchor precisely over a critical data cable is being treated as more than an accident by Finnish authorities. The vessel's journey originated in St. Petersburg, Russia, adding a geopolitical dimension to the investigation.

This event is part of a disturbing trend of incidents involving Baltic Sea infrastructure, including previous damage to the Balticconnector gas pipeline and other data cables. These acts of "hybrid influencing" are designed to test response times, create uncertainty, and demonstrate the capability to disrupt Western infrastructure without resorting to overt military action. The target, an undersea telecommunications cable, is vital for international data traffic, financial transactions, and internet connectivity.

Technical Analysis

The 'attack' in this case is physical, not digital, but has a direct impact on the cyber domain. The primary technique is physical destruction of infrastructure.

  1. Reconnaissance: The actors would need to know the precise location of the undersea cable. While these locations are often on public maritime charts, targeting a specific cable requires some level of planning.
  2. Execution (TA0040 - Impact): The method appears to be the deliberate or negligently reckless dragging of a ship's anchor across the seafloor. An anchor from a large cargo vessel can easily snag and sever an armored submarine cable.
  3. Impact: The immediate impact is a loss of connectivity and data transmission capacity between Finland and Estonia. This forces data to be rerouted, potentially causing congestion or reliance on less secure or less reliable pathways.

The Finnish Defense Minister's characterization of Russia's offer of assistance as 'hybrid influencing' is notable. It suggests that even the diplomatic and maritime responses surrounding such incidents are viewed through a lens of strategic competition and potential manipulation.

Impact Assessment

  • Immediate Impact: Disruption of telecommunications services provided by Elisa. While redundancy in the network likely prevented a total blackout, it would have reduced overall capacity and resilience.
  • Economic Impact: Repairing undersea cables is a complex and expensive operation, requiring specialized ships and equipment. It can also have secondary economic effects if key business data links are severed.
  • National Security Impact: This incident highlights the vulnerability of NATO countries' critical infrastructure. For Finland, a new NATO member, it is a stark reminder of its proximity to Russia and the potential for non-military threats. It forces a reassessment of physical security and monitoring of subsea assets.
  • Strategic Impact: The event contributes to a climate of instability and tension in the Baltic Sea, forcing nations to expend more resources on maritime surveillance and infrastructure protection.

Cyber Observables for Detection

Detection in this scenario is not based on traditional cyber observables but on physical and maritime domain awareness.

  • AIS (Automatic Identification System) Data: Monitoring vessel movements, particularly anomalous behavior like stopping or slowing down over known cable routes.
  • Satellite Imagery: Using synthetic aperture radar (SAR) or optical satellite imagery to monitor vessel activity in sensitive areas, regardless of their AIS status.
  • Acoustic Sensors: Deploying hydrophones or other acoustic sensors along cable routes to detect sounds consistent with anchor dragging or other seabed disturbances.
Type Value Description Context Confidence
other AIS Anomaly A vessel's AIS track showing it stopped, slowed, or exhibiting unusual movement patterns directly over a known critical cable path. Maritime Domain Awareness high
other Anchor Dragging Physical evidence on the seafloor, detected by sonar, showing a scar consistent with a dragged anchor leading to the point of cable damage. Physical Investigation high

Detection & Response

  • Enhanced Maritime Surveillance: Increased naval and coast guard patrols in areas with critical subsea infrastructure. This includes surface vessels, aircraft, and unmanned underwater vehicles (UUVs).
  • Data Fusion: Fusing data from AIS, radar, satellite imagery, and acoustic sensors into a common operating picture to quickly identify threatening behavior.
  • Rapid Response Teams: Having specialized cable repair ships and crews on standby to minimize downtime after an incident.
  • International Cooperation: Sharing intelligence and coordinating patrols with NATO allies and regional partners, as is happening in the Baltic Sea.

Mitigation

  • Physical Hardening: Where possible, burying cables deeper into the seabed or using rock-dumping techniques to cover them can provide additional protection against anchors and fishing trawlers.
  • Exclusion Zones: Establishing and enforcing maritime exclusion zones or areas of restricted navigation around critical infrastructure points, such as cable landing stations and key crossings.
  • Redundancy and Diversity: Investing in geographically diverse cable routes to ensure that the loss of a single cable does not cause a catastrophic failure. This includes a mix of subsea and terrestrial routes. This is the physical equivalent of D3-RBN: Redundant Backup Network.
  • Legal Deterrents: Prosecuting individuals and holding flag states accountable for damage to international infrastructure, as Finland is attempting to do with the crew of the "Fitburg," serves as a deterrent.

Timeline of Events

1
December 31, 2025
An undersea telecommunications cable connecting Finland and Estonia is damaged.
2
January 2, 2026
Finnish authorities board the cargo ship 'Fitburg' and arrest two crew members.
3
January 3, 2026
This article was published

MITRE ATT&CK Mitigations

Physical domain monitoring of critical infrastructure using AIS, satellite, and sonar to detect potential threats.

Ensure network resilience through geographically diverse and redundant data paths.

Analyze physical events and sensor data to determine the root cause of infrastructure failures.

D3FEND Defensive Countermeasures

The most effective mitigation against the physical severing of a single cable is to ensure it is not a single point of failure. National telecom providers and governments must invest in network resilience through geographic diversity. For the Finland-Estonia link, this means having multiple, physically separate subsea cables, as well as ensuring robust terrestrial connections via other neighboring countries. This creates a resilient mesh network where the loss of one link can be automatically absorbed by others with minimal disruption. This strategy accepts that individual links are vulnerable and focuses on maintaining overall service availability. It is a capital-intensive solution but is fundamental to the security of national critical infrastructure in the modern era.

This incident highlights the need to extend cybersecurity principles into the physical domain. Finland and its NATO allies must enhance their Maritime Domain Awareness (MDA) capabilities specifically for infrastructure protection. This involves fusing data from multiple sources in real-time: AIS data from ships, synthetic aperture radar (SAR) satellite imagery to spot 'dark' vessels with their AIS turned off, and acoustic sensors deployed along cable routes. An AI-powered system should be used to analyze this data, automatically flagging anomalous behavior such as a vessel loitering over a cable, a ship deviating from its stated course, or acoustic events consistent with anchor dragging. This provides an early warning system, allowing a coast guard vessel to be dispatched to investigate before damage occurs.

While no cable is completely invulnerable, physical hardening measures can increase resilience. In high-traffic areas like the Gulf of Finland, critical cables should be buried in the seabed using a sea plow rather than just laid on the surface. In areas where burial is not possible due to rocky seabeds, cables can be protected with articulated pipe or rock armor. While expensive, these measures significantly increase the difficulty for an anchor or fishing gear to snag and damage the cable. A risk-based approach should be used, applying the most robust hardening techniques at choke points, crossings, and areas closest to shore, which are most vulnerable.

Sources & References

Finland Advances Cable Breach Investigation with Arrests
MarineLink (marinelink.com) January 2, 2026
Two crew members arrested in Finland over submarine cable damage
Yeni Şafak (yenisafak.com) January 2, 2026
Hybrid Warfare in the Baltic: Finland Arrests Two Over Damaged Undersea Cable
All Things Nordic (allthingsnordic.com) January 3, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Undersea CableSabotageHybrid WarfareFinlandEstoniaBaltic SeaCritical Infrastructure

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading