US offers $10 million bounty for Russian hackers targeting critical infrastructure
- Marijan Hassan - Tech Journalist
- 3 days ago
- 2 min read
The United States Department of State has announced a reward of up to $10 million for information leading to the identification or location of three Russian intelligence officers accused of targeting critical infrastructure in the U.S. and globally. The bounty, offered under the Department's Rewards for Justice program, highlights escalating concerns over state-sponsored cyberattacks.

The three individuals, identified as Maksim Viktorovich Galochkin, Artem Valeryevich Zemlyankin, and Anatoliy Sergeyevich Kovalev, are alleged members of the Russian Federal Security Service (FSB) and are believed to be part of a hacking unit known as "Dragonfly," "Energetic Bear," or "Berserk Bear."
According to the indictment unsealed in March, the trio engaged in a sophisticated, multi-year campaign targeting energy facilities, nuclear power plants, and other critical infrastructure sectors between 2012 and 2017.
The alleged activities included spear-phishing campaigns, deploying malicious software, and gaining unauthorized access to computer networks. While the indictment does not claim any widespread power outages or catastrophic damage resulted from these specific intrusions, it warns of the persistent threats posed by such state-sponsored cyber operations.
"These Russian government-backed hackers have demonstrated a clear intent to disrupt and damage critical infrastructure, which could have devastating consequences for public safety and national security," stated a State Department spokesperson during a press briefing. "We are committed to using all tools at our disposal to bring these individuals to justice and protect our vital systems."
The Rewards for Justice program has historically been used to track down terrorists and war criminals. Its application in this context signals a significant escalation in the U.S. government's efforts to combat cybercrime and hold foreign actors accountable for malicious online activities.
Key Allegations Against the Individuals:
Maksim Viktorovich Galochkin: Accused of developing and deploying malware designed to compromise industrial control systems.
Artem Valeryevich Zemlyankin: Alleged to have conducted reconnaissance and exploited vulnerabilities in critical infrastructure networks.
Anatoliy Sergeyevich Kovalev: Believed to have played a role in the initial access and persistent presence within targeted systems.
Authorities are urging anyone with information regarding the whereabouts or identities of these individuals to contact the Rewards for Justice program. All tips will be treated with strict confidentiality.