September and October were supposed to be a quieter stretch after the frenetic pace of the summer. Instead, the EU fired off an array of sanctions decisions that spanned human‑rights abuses, data housekeeping, terrorist designations, hybrid threats and, finally, a sweeping 19th Russia package that touches energy, finance, trade and shipping. This roundup follows on from the July–August article and continues the narrative that sanctions are a strategic instrument, not just a compliance chore. It charts the major Official Journal entries over the last two months and reflects on what they mean for institutions navigating Europe’s sanctions landscape.
Human rights under the microscope – 5 September
On 5 September the EU exercised its global human‑rights sanctions regime by listing Vadim Bulgakov and Aleksei Pikin , the head and deputy head of the Crimean penal enforcement service. They are accused of systematic ill‑treatment of political prisoners in the Simferopol detention centre . The measure carries the usual asset freeze and travel ban, but the real message is that abuses in occupied Crimea will be chased with the same rigour as military offences. This two‑name update may seem modest compared with July’s action against Haitian gang leaders , yet it underscores how the EU’s country‑agnostic framework continues to punish human‑rights violators.
When small human‑rights listings appear in the Official Journal, compliance teams sometimes treat them as housekeeping. That is a mistake. In my experience working with due‑diligence teams, these “two‑name” updates often trip up poorly configured screening systems, leading to missed matches or unwarranted alerts. They also signal the EU’s determination to pursue abuses wherever they occur – from Crimea to Haiti – and demonstrate that humanitarian issues sit alongside geopolitics in the sanctions playbook. Viewing these actions as minor can lull institutions into complacency; the test is whether controls respond to incremental updates as rigorously as to headline‑grabbing packages. human rights abuses in Crimea
Renewed individual sanctions – 12 September
The EU renewed its individual sanctions over Russia’s territorial integrity for another six months , extending travel bans and asset freezes on more than 2 500 individuals and entities until 15 March 2026. Only one entry was not renewed and one deceased individual was removed . This kind of renewal rarely makes headlines, but it keeps a vast population of sanctioned persons in scope and forces institutions to maintain due‑diligence processes year after year.
Six‑month renewals can be deceptively disruptive. Clients often ask why they must revisit long‑standing relationships when nothing “new” has been added. The answer lies in changing risk appetite: each renewal invites a fresh look at exposures, particularly as the EU’s geopolitical stance evolves and as more robust enforcement actions, like July’s hybrid‑threat listings , raise the bar. For due‑diligence teams, it means verifying that existing customers still qualify under updated criteria and ensuring case files remain defensible if regulators ask why a longstanding relationship was maintained. over 2,500 individuals and entities remain under sanctions
Data hygiene – big numbers, quiet impact – 15 September
Council Implementing Regulation (EU) 2025/1894 updated identifying information for 142 individuals and 134 entities in the Russia/Ukraine regime and deleted two entries. These updates rarely attract media coverage, but they can spark waves of alerts as new passport numbers, aliases and addresses are fed into screening systems. According to a sanctions‑screening guide, poor data quality and name‑matching challenges are among the main causes of false positives , and incomplete or inaccurate data dramatically increases the chances of misidentification .
Data quality updates are where list management meets operational complexity. When hundreds of identifiers change at once, re‑screening can generate thousands of alerts. Without robust automation, analysts end up chasing false positives instead of real risks. That is why institutions increasingly rely on dedicated watchlist‑management tools like our FacctList solution – software that automatically ingests and validates updates, maintains auditable change logs, and pushes cleansed lists to screening engines in near real time. The lesson from this September exercise is that sanctions are not just about adding names; they demand high‑fidelity data governance across the lifecycle.
UN–EU terrorism pipeline – 16 September
Commission Implementing Regulation (EU) 2025/1897 amended five entries in the EU’s ISIL/Al‑Qaida list to reflect an earlier UN Security Council decision . Such updates illustrate the pipeline through which UN designations are quickly mirrored in EU law. Even if only a handful of entries change, the expectation is that compliance systems ingest UN‑driven amendments as soon as they are published in the Official Journal.
Synchronisation between UN and EU lists is often overlooked, yet it’s an area where regulators expect zero latency. In practice, I see this pipeline testing internal service‑level agreements: are your vendors updating within hours, and can you evidence that re‑screening occurred accordingly? It also shows how terrorism frameworks remain evergreen, with names from the early 2000s still being adjusted 20 years on. Failing to treat these minor updates as compliance events can expose institutions to accusations of lax controls. UN-EU designations alignment
Iran snapback – 29 September
After the UN Security Council failed to renew Resolution 2231 by 27 September, the EU re‑imposed its pre‑JCPOA restrictive measures on Iran. Annex VIII to Regulation 267/2012 was amended to reinstate names and entities tied to nuclear and ballistic programmes. Many of the re‑listed individuals and companies had not appeared on EU watchlists for a decade.
Snapback events reopen dormant files. Compliance teams need to dig into archives to check whether re‑listed persons were ever customers or counterparties, sometimes tracing relationships back to the early 2010s. The experience feels like reopening cold cases: you have to connect legacy data to modern systems and prove you have remediated any exposure. This September snapback echoes the July data‑hygiene update; both remind us that sanctions compliance demands a long memory and the ability to resurface old connections when geopolitical winds shift. re-imposition of Iran restrictive measures
Hybrid threats: prolongation – 3 October
On 3 October the Council extended hybrid‑threat sanctions for another year . These measures, first adopted in October 2024, target 47 individuals and 15 entities responsible for foreign information manipulation, cyber‑attacks and other destabilising acts . The renewal keeps asset freezes and travel bans in place through 9 October 2026.
Hybrid threats blur the line between national security and financial crime. In July, the EU listed Russian broadcasters and electronic warfare units for signal jamming . The October renewal shows the EU is in this for the long haul. For banks and fintechs, this means that cybersecurity events – such as GPS jamming or disinformation campaigns – can have sanctions implications. Cross‑functional teams (cyber, sanctions, fraud) need to collaborate because hybrid attackers may also use shell companies or crypto to move funds. This intersection of domains will only grow as the EU’s hybrid‑threat toolbox evolves.
Belarus: alignment and new listings – 23 October
Alongside its Russia measures, the EU updated its Belarus sanctions. Council Implementing Regulation (EU) 2025/2039 added two individuals and three entities associated with military and state repression. Council Regulation (EU) 2025/2041 broadened trade bans to include products such as electronic components, chemicals, metals, salts, ores and all acyclic hydrocarbons . It also extended service prohibitions to AI, quantum computing and crypto payment services and imposed prior‑authorisation requirements for services to the Belarusian government .
Belarus is increasingly treated as an extension of Russia’s war economy. By mirroring many of the Russia trade and service bans , the EU is signalling that goods routed through Minsk will face the same scrutiny as those shipped via St Petersburg. For supply‑chain and trade‑finance teams, that means mapping whether critical components pass through Belarusian entities, and adjusting contracts accordingly. The update also shows how emerging technologies (AI, quantum computing) are entering the sanctions perimeter – a sign that the EU is future‑proofing its toolkit.
Belarus measures mirror Russia sanctions
Russia’s 19th sanctions package – 23 October
The centrepiece of the autumn sanctions cycle was the 19th package against Russia. It is arguably the most comprehensive set of measures since the invasion. Instead of incremental changes, the package attacks multiple revenue streams and enforcement gaps at once . Below are the key pillars and why they matter.
Energy and shipping
The package introduces a phase‑out of Russian liquefied natural gas (LNG): short‑term contracts must end within six months and long‑term contracts by 1 January 2027 . It imposes a full transaction ban on Rosneft and Gazprom Neft and sanctions several Chinese refineries and traders . A specific LPG variant used to skirt earlier restrictions is now banned . The EU also added 117 vessels to its shadow‑fleet blacklist, bringing the total to 557 , and sanctioned facilitators like Litasco Middle East and maritime registries that provide false flags .
Energy sanctions are no longer symbolic – they are designed to structurally unwind Russia’s hydrocarbons revenue over years. By setting a 2027 deadline for LNG contracts , Brussels is telling markets to plan for a world where Russian gas is absent from European terminals. The addition of 117 vessels illustrates the difficulty of policing a shadow fleet that constantly re‑flags and reroutes. For traders and insurers, this means building vessel‑tracking and ownership‑verification capabilities into compliance programmes. It also harks back to July’s anti‑circumvention rules, which empowered Member States to halt exports suspected of heading to Russia; those tools are now being wielded against maritime networks, not just goods.
Finance and payments
Five Russian banks were added to the transaction ban , while five banks in Central Asia and the Middle East and four financial institutions using Russia’s SPFS payment system were also sanctioned . EU operators are prohibited from engaging with Russia’s Mir and SBP payment systems . The package pioneers crypto sanctions: the developer and Kyrgyz issuer of the A7A5 stablecoin and a trading platform are listed , and EU crypto‑service providers are banned from enabling Russian fintech routes .
This is a frontal assault on Russia’s financial plumbing. Banks must update their watchlists to include the new Russian and third‑country banks and ensure any Mir or SBP transactions are blocked. The crypto measures show that digital assets are now fully part of the sanctions architecture – even stablecoins and exchanges are within scope . Although I’m not a crypto specialist, the implication for compliance is clear: payment teams should treat crypto rails like traditional correspondent banking, with screening, transaction monitoring and on‑/off‑ramp controls. The package also reminds us that cross‑border banks in Kazakhstan, Tajikistan or Hong Kong are just as critical as Moscow’s megabanks; circumventing through them will not work.
Trade and export controls
The 19th package extends export restrictions to cover metals for weapon systems, chemicals used in propellants and a wide array of mundane products: salts, ores, construction materials and rubber goods . It adds 45 new entities to the dual‑use list, including 17 in third countries (12 in China/Hong Kong, three in India, two in Thailand) . The package also introduces anti‑circumvention mechanisms, enabling the listing of entities that facilitate Russia’s military‑industrial complex .
The addition of everyday goods like salts and tyres may surprise exporters, but these items can feed into explosives, construction of fortifications and vehicle maintenance. For manufacturers and logistics firms, the challenge is to map supply chains to identify dual‑use goods and verify end‑users. This will require collaboration between procurement, legal and compliance teams, and may involve pushing suppliers for end‑use certificates. The presence of third‑country entities, particularly in China and India , highlights the global web that sustains Russia’s war economy and echoes July’s 18th package, which first empowered Member States to block suspicious third‑country shipments.
Listings and new criteria
Sixty‑nine individuals and entities are added to the sanctions list, including oligarchs, energy companies, a gold producer and shadow‑fleet operators . Notably, the EU introduces a new listing criterion for those responsible for abduction and forced assimilation of Ukrainian children , and immediately lists 11 persons involved in such activities .
Screening for human‑rights abusers is complex, especially when minors are involved and the alleged crimes occur in occupied territories. The new criterion institutionalises accountability for abducting and indoctrinating Ukrainian children . For compliance teams, this means updating customer and transactional screening to capture not only obvious state actors but also individuals linked to social services, education programmes or adoption agencies in conflict zones. It also signals that the EU is prepared to innovate its framework when it perceives gaps – just as it did by targeting Haitian gang leaders and Russian propagandists over the summer.
The bigger picture
Looking across these updates, several themes emerge. First, scope creep: sanctions now target energy exports, crypto rails, shipping registries, AI services, gang leaders and prison officials. Second, alignment and anti‑circumvention: the EU is synchronising with UN listings , mirroring Russia measures onto Belarus and adding third‑country facilitators . Third, data and process discipline: renewals and data‑hygiene updates remind us that robust list management is as important as headline designations. Fourth, human‑rights and hybrid threats: the EU is expanding sanctions to cover information manipulation, child abductions and domestic abuses, reflecting a broader definition of security.
Operational reflections and compliance checklist
Maintain timestamped ingestion logs for each update (5 Sept human‑rights listings, 12 Sept renewal, 15 Sept data update, 16 Sept UN pipeline, 29 Sept snapback, 3 Oct hybrid‑threat renewal, 23 Oct Belarus measures, 23 Oct Russia package). Regulators may ask to evidence when the lists were loaded and re‑screened.
Re‑screen both current and historical data. Snapback events and data‑quality updates mean dormant names can re‑appear. Ensure that archives and dormant accounts are included in re‑screening.
Update bank and payment filters to block transactions involving newly sanctioned Russian and third‑country banks, Mir and SBP systems, and any crypto rails linked to A7A5 and sanctioned exchanges .
Enhance vessel tracking and shipping due diligence to account for the expanded shadow‑fleet list and re‑insurance bans . Work with maritime intelligence providers to identify disguised vessels and avoid sanctions breaches.
Map supply chains and dual‑use goods for the expanded export restrictions. Engage suppliers to understand whether goods like salts, tyres and machinery components might end up in Russian military applications .
Implement robust list‑management solutions. Use tools like FacctList to automate ingestion, validation and distribution of updated lists, and to manage high volumes of identifier changes.
Coordinate cross‑functional teams. Hybrid‑threat and cyber‑related sanctions require collaboration between cybersecurity, sanctions and fraud teams. Similarly, trade‑finance, procurement and legal teams need to work together on export controls.
Train staff on new listing criteria, especially around human‑rights abuses, abduction of children and third‑country facilitators. Ensure analysts understand the context and can justify decisions.
Recapping September and October's EU Sanctions
September and October demonstrate that EU sanctions are evolving into a multi‑dimensional strategy. They now cut across energy markets, financial infrastructure, technological services and human‑rights enforcement. For compliance professionals, the takeaway is clear: agility and comprehensiveness are essential. It is no longer enough to wait for list changes; institutions must anticipate new pressure points, invest in data‑quality tools, and build cross‑functional capabilities. The autumn packages show that the EU is prepared to weaponise regulation wherever it sees risk – from LNG contracts to stablecoins and prison wardens. Staying ahead means treating every update, no matter how small, as part of a larger, interconnected puzzle.





