Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

Serhii Demediuk (pictured) said in an interview with The Associated Press that Russian-controlled digital saboteurs are stepping up attacks on the Central Elections Commission and its employees, trying to penetrate electronic systems in order to manipulate information about the March 31 election.

“On the eve of the election and during the counting of votes there will be cyberattacks on certain objects of critical infrastructure. This applies to the work of the polling stations themselves, districts, and the CEC,” he said.

“From what we are seeing, it will be manipulation aimed at distorting information about the results of elections, and calling the elections null or void,” Demediuk said.

The presidential election will be a test of Ukraine’s capacity for order. Russia has consistently portrayed Ukraine under President Petro Poroshenko as corrupt and poorly run, and undermining the election’s credibility could serve Russia’s propaganda interests.

Ukraine aspires to join the European Union and NATO, and an orderly and credible election could show that it is approaching the democratic standards that those organisations consider key.

Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity.

Since 2014, its energy, transportation and banking systems have been attacked. The malicious program NotPetya hit thousands of computers not only in Ukraine, which was the main target of the attack, but throughout the world.

Asked about Demediuk’s claims, Kremlin spokesman Dmitry Peskov said Wednesday 13th February: “We know nothing about this. The only thing I can say is that we’ve been hearing similar statements from different countries in the world. This is becoming a sort of mania or phobia but it has nothing to do with reality. Russia has never had anything to do with any types of cybercrimes.”

None of the 44 registered candidates appear to have enough support to win an absolute majority, which would force a runoff three weeks later.

The activity of hackers has noticeably increased during the election campaign six weeks before the elections, Demediuk said. He said some of the hackers are impersonating top officials in order to penetrate the computers of commission members and technical staff.

“Every day cyber incidents that come from Russia or from other countries are increasing. Why from other countries? Because our opponents and enemies are not stupid, they use different methods to anonymize and distort information,” he said.

Kiev says the hackers are combining usual digital espionage methods with attempts to manipulate or intimidate.

“We see a combination of classic cyberattacks, such as those previously committed, with misinformation and social engineering,” Demediuk said.

In 2015 Ukraine was the site of the world’s first confirmed attack on a power system. The hackers succeeded in paralysing 30 electrical substations and leaving around 230,000 people without power.

Demediuk said malicious Russian software was often tested in Ukraine, then later used in other countries.

“Ukraine is the launching pad where it all begins ... they first of all test us. We are the enemy for them, and they are for us. And so the use of any cyber weapon is a priority. And if it works with us, they then upgrade it to the requirements and infrastructure and use it in this or that country,” said Demediuk.

He said Ukraine continues to monitor the activities of the group nicknamed APT28 or Fancy Bear, which the US Department of Justice and a host of independent reports have tied to Russia’s military intelligence agency, often called the GRU.

“We follow them, we have indicators with which we can identify and see them. They constantly carry out their activities here,” he said.

APNews

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« IoT Is In The Dark When It Comes To ePrivacy
Dating Sites Fraudster Alert »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

Caretower

Caretower

Caretower is one of Europe’s leading value added managed service provider in cyber security.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Utilize

Utilize

Utilize is an award-winning technology company with over 25 years of industry expertise, we support hundreds of businesses across London and the South East.