Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

The UK exposes the Russian cyber company to support Ukraine

Imran Rahman-Johns and Chris Valan

Reporters Technology

Getty Images Load truck loads help in a truckGets the image

The UK revealed what it is written that it is a “malicious cyber company” aimed at several organizations, including participants involved in providing foreign aid to Ukraine

Following a joint investigation with allies, including the US, Germany and France, the National Cybersecurity Center in the UK (NCSC) said the Russian military unit is focusing on state, and private organizations since 2022.

These include organizations involved in the protection, IT services and logistics support.

Security agencies of 10 NATO and Australian countries said Russian spies used a combination of hacking methods to access networks.

Some of the goals were cameras related to the Internet, at the Ukrainian borders that track the supplies of assistance that go to the country.

The report also states that about 10,000 cameras were delivered near “military installations, and railway stations to track the movement of materials to Ukraine.

He adds “actors who also used legal municipal services, such as traffic chambers.”

The Russian military unit is accused of espionage, called GRU Unit 26165, but there are a number of informal names, including The fantasy of the bear.

Of course, a well -known hacking team Previously leaned World anti -doping agencies and played a key role in Cyber-over 2016 According to security experts, the US Democratic National Committee.

“This malicious Russian military intelligence campaign is a serious risk to target organizations, including those involved in assistance to Ukraine,” Paul Chister, director of the NCSC said in a statement.

“We urge organizations to get acquainted with the tips on the threat and soften the consequences of the advice to help protect their networks,” he added.

Internet "This domain was confiscated".Internet -Archives

Fancy Bear site was closed by FBI in 2018

Cyber ​​security consultations stated that Fancy Bear had sent organizations related to critical infrastructure, including ports, airports, air traffic management and defense industry.

They were in 12 mainland European countries and the US.

Hackers used a combination of methods to gain access, according to a message, including guessing passwords.

Another method used is called Spearphishing, where fake sheets are aimed at certain people who have access to systems.

They are provided by a fake page on which they enter into their entry data, or recommend to go to the link that then sets malicious software.

“Spearphishing letters were varied and ranged from professional topics for adults,” the statement reads.

Microsoft Outlook vulnerability was also used to collect powers “using specially designed invitations to appoint calendar viewing.”

Green advertising banner with black squares and rectangles that form pixels moving on the right. The text states:

Source link