Russian Hackers using new Viruses for Attacks

State-sponsored Russian hackers are using a new type of virus designed to attack critical Ukrainian infrastructure such as the power grid and financial system, a senior Ukrainian state security official said recently.

Called "telebots", the new viruses are not like ordinary malware, designed for example to steal personal data, but are tailor-made to attack specific institutions, Oleksandr Tkachuk, Ukraine's security service chief of staff, said at a televised news conference.

Tkachuk said the attacks were orchestrated by the Russian security service in collusion with private software companies and criminal hackers, and looked like they were designed by the same people who created a malware called "BlackEnergy".

Kiev has accused Russia of waging a "cyber war" on Ukraine, as relations between the two countries collapsed after Moscow's annexation of Crimea in 2014 and the outbreak of Russian-backed separatist fighting in Ukraine's Donbass region.

Russia's Federal Security Service (FSB) was not available for immediate comment. Russia has repeatedly denied hacking accusations, which also roiled the US presidential race.

"We received information that not only the staff of Russian special services are involved in the attacks, but also private IT companies and criminal groups of hackers from the territory of the Russian Federation," Tkachuk said without giving an exact time frame.

The virus code was designed to target industrial processes by attacking specific parts of industrial infrastructure, he said. As an example, he said that the code included modules designed to harm specific equipment inside the electric grid.

Ukraine says it is coming under increasing cyber-attacks from Russia -- 6,500 of them in November and December alone. In a recent interview, President Petro Poroshenko called for a global response led by Washington.

Ukraine blamed hackers for knocking out part of Kiev's power grid in December, and for attacks on the defense and finance ministries and the State Treasury, which allocates cash to state institutions.

Ein News:

 

« Guide To The Internet of Things
Make The Most Of Data Analytics »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.

LabEx

LabEx

LabEx is an AI-Powered learning platform with labs spanning from Linux devops to web development and cybersecurity.