Article 361. Unauthorized Interference with the Operation of Information Systems

Section XVI: Crimes in the Use of Computers, Systems, and Networks
Status: Applied to large-scale Russian cyberattacks on critical infrastructure and government bodies

Legal Qualification of Cyberattacks on Ukraine’s Information and Communication Systems

Article 361 of the Criminal Code of Ukraine (CCU) establishes criminal liability for unauthorized interference with the operation of computers, automated systems, computer networks, or communication networks if it leads to leakage, loss, falsification of information, or disruption of system operations. In the context of full-scale aggression, this article is the primary instrument for holding accountable those responsible for large-scale cyberattacks targeting critical infrastructure (energy systems, banks, transport) and Ukrainian state authorities.

Key Provisions of Article 361 (CCU)

Cyberwarfare and Critical Infrastructure: Cyberattacks conducted by hacker groups linked to Russian intelligence services (GRU, FSB, SVR) often employ wiper attacks and DDoS attacks to disrupt government registries, banking, and energy systems. Real examples include NotPetya virus attacks aimed at Ukrainian banking systems in 2017–2022, and attempts to block government portals from 2022–2025. Such acts are always qualified under Part 3 of Article 361 CCU as committed by an organized group and resulting in severe consequences for national security.

Evidence of Violation (Large-Scale Cyberattacks)

Connection with Other Articles

Legal Consequences

Sanctions under Article 361 CCU, especially Part 3 (up to 10 years imprisonment), allow strict punishment for those involved in cyber aggression. These cases also contribute to the evidentiary basis for crimes of aggression and war crimes in international courts, including the ICC and tribunals for Ukraine.

Sources