World Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes

04:20  13 january  2018
04:20  13 january  2018 Source:   MSN

What makes Russia’s new spy ship Yantar special?

  What makes Russia’s new spy ship Yantar special? Syria, the US coast and now Argentina - a hi-tech Russian spy ship roams the world's oceans.Argentina has given up trying to rescue the 44 crew aboard the ARA San Juan, which disappeared on 15 November. But it still wants to find the diesel-electric submarine.

Which in December 2016 attacked the financial system, transport and energy facilities of Ukraine using TeleBots and BlackEnergy.” “This testifies to the involvement of the special services of Russian Federation in this attack .” The SBU reckons NotPetya 's failed attempt at extorting Bitcoin was never

The number 1 news site for Military news, stories and current affairs.

a screen shot of a computer: A laptop displays a message after it was infected with ransomware resembling the 'NotPetya' attack last year.© Rob Engelaar/EPA A laptop displays a message after it was infected with ransomware resembling the 'NotPetya' attack last year.

The CIA has attributed to Russian military hackers a cyberattack that crippled computers in Ukraine last year, an effort to disrupt that country's financial system amid its ongoing war with separatists loyal to the Kremlin.

Loading...

Load Error

The June 2017 attack, delivered through a mock ransomware virus dubbed NotPetya, wiped data from the computers of banks, energy firms, senior government officials and an airport.

Subscribe to the Post Most newsletter: Today’s most popular stories on The Washington Post

At least seven Russian planes destroyed by shelling at Syrian air base: Kommersant

  At least seven Russian planes destroyed by shelling at Syrian air base: Kommersant At least seven Russian planes were destroyed by rebel shelling at the Hmeymim air base in Syria on Dec. 31, Russian daily Kommersant reported late on Wednesday, citing two sources. In the single biggest loss of military hardware for Russia since it launched air strike in Syria in autumn 2015, more than 10 servicemen were wounded in the attack by "radical Islamists", the report said.At least four Su-24 bombers, two Su-35S fighters and an An-72 transport plane, as well as an ammunition depot, were destroyed by the shelling, Kommersant said on its website, citing two "military-diplomatic" sources.

The press is full of accusations that the Russians unleashed a highly damaging cyberattack called NotPetya in Ukraine last month. Can one conclude that the attack that hit 64 other countries as just a residual result of the Ukrainian cyber -event?

Security experts found that the version of Petya used in the Ukraine cyberattacks had been modified, and subsequently has been named NotPetya or "This testifies to the involvement of the special services of Russian Federation in this attack," it concluded .[7][35] (A December 2016 cyber attack

The GRU military spy agency created NotPetya, the CIA concluded with "high confidence" in November, according to classified reports cited by U.S. intelligence officials.

The CIA declined to comment.

Ukraine has been a significant target of GRU cyberattacks coinciding with Russia's annexation of Crimea and aggression elsewhere. The NotPetya assault was launched on Ukraine's Constitution Day, a public holiday.

The virus also affected computer systems in Denmark, India and the United States, but more than half of those victimized were in Ukraine.

The attacks reflect Russia's mounting aggression in cyberspace as part of a larger "hybrid warfare" doctrine that marries traditional military means with cyber-tools to achieve its goal of regional dominance. "It's a pattern of more bold, aggressive action," said Robert Hannigan, former head of Britain's GCHQ intelligence agency.

Russian gains in Syria threatened by series of rebel attacks

  Russian gains in Syria threatened by series of rebel attacks Just weeks after Russian President Vladimir Putin declared victory in Syria, Russian military outposts in the country have come under rebel attacks that are challenging Moscow's gains.Russian bases located in Syrian President Bashar Assad's Alawite heartland had been immune to rebel raids ever since Moscow launched its campaign in Syria in September 2015. But a series of drone attacks and mortar and rocket shelling in recent days has broken the calm.

Ukrainian officials have said the NotPetya attack directly targeted Ukraine and was carried about by a hacking group widely known as Black Energy, which some cyber experts say works in favor of Russian government interests. Moscow has repeatedly denied carrying out cyber attacks against Ukraine .

Fatal error: Not open query. Statement error: SELECT n.*, n.title_en AS title, a.linkname AS authorLinkname, CONCAT_WS(' ', a.name_en, a.lastname_en) AS authorName FROM core_news n LEFT JOIN core_author a ON a.id = n.author WHERE n.active = 'y' AND () AND n.id != '

The hackers used what is known as a "watering hole" attack. They infected a website to which they knew their targets would navigate — in this case, a Ukrainian site that delivered updates for tax and accounting software programs.

It's a tactic that Russian government hackers also have used to compromise industrial control system networks. The goal here was "the disruption of Ukraine's financial system," said Jake Williams, founder of the cybersecurity firm Rendition Infosec.

In a twist, the attackers used malware that appeared to be ransomware — a technique that encrypts victims' data and decrypts it only if a ransom is paid, to make it appear as though criminal hackers or some group other than a nation state were the culprits.

They deployed NotPetya a month after a different worm, WannaCry, infected computers with ransomware in 150 countries. The U.S. National Security Agency linked that virus to the North Korean government, The Washington Post reported last year.

"For many days, people were classifying NotPetya as an actual ransomware," said Matt Suiche, founder of Comae Technologies, a cybersecurity firm. "It took a few days for people to understand what it was doing" — that it was permanently wiping data, he said.

The hackers worked for the military spy service's GTsST, or Main Center for Special Technology, the CIA reported. That unit is highly involved in the GRU's cyberattack program, including the enabling of influence operations.

For Russia the sweet taste of Trump's victory has turned sour .
It didn't take long for Russia's high hopes about US President Donald Trump to fade and for the disillusionment to set in following Trump's inauguration. Literally, on the floor of the Russian parliament, MPs cracked open bottles of sparkling wine and toasted his victory.

Source: http://us.pressfrom.com/news/world/-112509-russian-military-was-behind-notpetya-cyberattack-in-ukraine-cia-concludes/

—   Share news in the SOC. Networks
This is interesting!