Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Reporters Technology
The UK revealed what it is written that it is a “malicious cyber company” aimed at several organizations, including participants involved in providing foreign aid to Ukraine
Following a joint investigation with allies, including the US, Germany and France, the National Cybersecurity Center in the UK (NCSC) said the Russian military unit is focusing on state, and private organizations since 2022.
These include organizations involved in the protection, IT services and logistics support.
Security agencies of 10 NATO and Australian countries said Russian spies used a combination of hacking methods to access networks.
Some of the goals were cameras related to the Internet, at the Ukrainian borders that track the supplies of assistance that go to the country.
The report also states that about 10,000 cameras were delivered near “military installations, and railway stations to track the movement of materials to Ukraine.
He adds “actors who also used legal municipal services, such as traffic chambers.”
The Russian military unit is accused of espionage, called GRU Unit 26165, but there are a number of informal names, including The fantasy of the bear.
Of course, a well -known hacking team Previously leaned World anti -doping agencies and played a key role in Cyber-over 2016 According to security experts, the US Democratic National Committee.
“This malicious Russian military intelligence campaign is a serious risk to target organizations, including those involved in assistance to Ukraine,” Paul Chister, director of the NCSC said in a statement.
“We urge organizations to get acquainted with the tips on the threat and soften the consequences of the advice to help protect their networks,” he added.
Cyber security consultations stated that Fancy Bear had sent organizations related to critical infrastructure, including ports, airports, air traffic management and defense industry.
They were in 12 mainland European countries and the US.
Hackers used a combination of methods to gain access, according to a message, including guessing passwords.
Another method used is called Spearphishing, where fake sheets are aimed at certain people who have access to systems.
They are provided by a fake page on which they enter into their entry data, or recommend to go to the link that then sets malicious software.
“Spearphishing letters were varied and ranged from professional topics for adults,” the statement reads.
Microsoft Outlook vulnerability was also used to collect powers “using specially designed invitations to appoint calendar viewing.”