In a significant law enforcement victory, a Russian national suspected of being a high-level hacker for Russia's GRU military intelligence agency has been arrested in Phuket, Thailand. The suspect is widely reported to be Aleksey Lukashev, a senior lieutenant in GRU Unit 26165, the group publicly known as APT28 (or Fancy Bear). The arrest, which occurred on November 7, 2025, was the result of a joint operation between Thailand's Cyber Crime Investigation Bureau (CCIB) and the U.S. Federal Bureau of Investigation (FBI). Lukashev is under a 2018 U.S. indictment for his role in the hacking campaigns targeting the 2016 U.S. presidential election. He is currently being held in Thailand pending extradition proceedings to the United States.
Aleksey Lukashev was specifically indicted for his alleged role in developing and managing the infrastructure used to carry out spear-phishing campaigns and hack into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC).
The arrest was a textbook example of international law enforcement cooperation. The FBI alerted Thai authorities to the suspect's presence in the country, providing intelligence that led to his location. During the raid, Thai police seized laptops, mobile phones, and digital wallets. The investigation also linked the suspect to local cybercrime, specifically malware that stole cryptocurrency trading credentials from at least six Thai victims, with over 14 million baht (~$400,000 USD) recovered.
The arrest of a state-sponsored actor like Lukashev is a significant event. While it will not halt the operations of a large and well-resourced group like APT28, it serves several important purposes:
Training users to identify and report spear-phishing emails remains a critical defense against APT28's primary initial access method.
Enforcing MFA makes credential harvesting attacks, a key part of APT28's playbook, much less effective.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats