Romania Pays the Cyber Price for Backing Ukraine. Where Is the EU?

Romania Pays the Cyber Price for Backing Ukraine. Where Is the EU?

The Cipher Brief
The Cipher BriefMar 25, 2026

Key Takeaways

  • Russian ransomware attacks target Romanian critical infrastructure
  • EU cyber sanctions framework underused, only 21 designations since 2019
  • Unanimous EU voting lets single state block sanctions
  • Poor cyber hygiene amplifies ransomware success across Europe
  • Faster, majority‑vote sanctions could deter Russian hybrid warfare

Summary

Romania’s water agency, coal‑power producer and oil‑pipeline operator have suffered ransomware attacks linked to Russian‑aligned groups such as Qilin and Gentlemen, which the country’s top cyber official says are timed with its support for Ukraine. The EU possesses a cyber‑sanctions toolbox, yet since its 2019 launch it has designated only 17 individuals and four entities, leaving Russian‑backed ransomware largely unchecked. The author argues that the EU’s unanimity requirement lets a single member veto designations, slowing response and encouraging further hybrid attacks on European critical infrastructure. Strengthening the sanctions regime and enforcing stricter cyber‑hygiene standards could raise costs for attackers and signal a more robust European security posture.

Pulse Analysis

Ransomware has become a preferred instrument in Russia’s hybrid warfare playbook, allowing hostile actors to strike at the heart of European societies without firing a single shot. Recent breaches of Romania’s water authority, a major coal‑fired power plant and a key oil‑pipeline operator illustrate how these groups time attacks to coincide with political decisions that support Kyiv. By disrupting essential services, they sow economic uncertainty and erode public confidence, reinforcing Moscow’s broader strategy of destabilizing its most vocal allies in the region.

The EU’s cyber‑sanctions framework, introduced in 2019, was designed to impose financial and reputational costs on actors who weaponize cyberspace. In practice, however, it has been applied sparingly—only 17 individuals and four entities have been listed in seven years—while thousands of offensive operations continue unabated. A key structural flaw is the unanimity rule in the Council, which enables any member state to veto a designation. This procedural hurdle has delayed responses to high‑profile incidents such as NotPetya and the Bundestag breach, diluting the deterrent effect and signaling a lack of collective resolve.

To restore credibility, the EU must overhaul its sanctioning process, moving to qualified‑majority voting and accelerating the designation pipeline. Coupling sanctions with rigorous enforcement of the NIS2 Directive would raise the baseline of cyber hygiene across critical sectors, closing the low‑security gaps that ransomware groups exploit. Regional cooperation—exemplified by the trilateral alliance of Romania, Moldova and Ukraine—can further streamline threat intelligence sharing and coordinate swift punitive actions. Together, a more decisive sanctions regime and stronger defensive standards can increase the cost of Russian‑linked cyber aggression, safeguarding Europe’s infrastructure and its economic competitiveness.

Romania Pays the Cyber Price for Backing Ukraine. Where is the EU?

Comments

Want to join the conversation?