Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

Serhii Demediuk (pictured) said in an interview with The Associated Press that Russian-controlled digital saboteurs are stepping up attacks on the Central Elections Commission and its employees, trying to penetrate electronic systems in order to manipulate information about the March 31 election.

“On the eve of the election and during the counting of votes there will be cyberattacks on certain objects of critical infrastructure. This applies to the work of the polling stations themselves, districts, and the CEC,” he said.

“From what we are seeing, it will be manipulation aimed at distorting information about the results of elections, and calling the elections null or void,” Demediuk said.

The presidential election will be a test of Ukraine’s capacity for order. Russia has consistently portrayed Ukraine under President Petro Poroshenko as corrupt and poorly run, and undermining the election’s credibility could serve Russia’s propaganda interests.

Ukraine aspires to join the European Union and NATO, and an orderly and credible election could show that it is approaching the democratic standards that those organisations consider key.

Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity.

Since 2014, its energy, transportation and banking systems have been attacked. The malicious program NotPetya hit thousands of computers not only in Ukraine, which was the main target of the attack, but throughout the world.

Asked about Demediuk’s claims, Kremlin spokesman Dmitry Peskov said Wednesday 13th February: “We know nothing about this. The only thing I can say is that we’ve been hearing similar statements from different countries in the world. This is becoming a sort of mania or phobia but it has nothing to do with reality. Russia has never had anything to do with any types of cybercrimes.”

None of the 44 registered candidates appear to have enough support to win an absolute majority, which would force a runoff three weeks later.

The activity of hackers has noticeably increased during the election campaign six weeks before the elections, Demediuk said. He said some of the hackers are impersonating top officials in order to penetrate the computers of commission members and technical staff.

“Every day cyber incidents that come from Russia or from other countries are increasing. Why from other countries? Because our opponents and enemies are not stupid, they use different methods to anonymize and distort information,” he said.

Kiev says the hackers are combining usual digital espionage methods with attempts to manipulate or intimidate.

“We see a combination of classic cyberattacks, such as those previously committed, with misinformation and social engineering,” Demediuk said.

In 2015 Ukraine was the site of the world’s first confirmed attack on a power system. The hackers succeeded in paralysing 30 electrical substations and leaving around 230,000 people without power.

Demediuk said malicious Russian software was often tested in Ukraine, then later used in other countries.

“Ukraine is the launching pad where it all begins ... they first of all test us. We are the enemy for them, and they are for us. And so the use of any cyber weapon is a priority. And if it works with us, they then upgrade it to the requirements and infrastructure and use it in this or that country,” said Demediuk.

He said Ukraine continues to monitor the activities of the group nicknamed APT28 or Fancy Bear, which the US Department of Justice and a host of independent reports have tied to Russia’s military intelligence agency, often called the GRU.

“We follow them, we have indicators with which we can identify and see them. They constantly carry out their activities here,” he said.

APNews

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« IoT Is In The Dark When It Comes To ePrivacy
Dating Sites Fraudster Alert »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.

Stratsec

Stratsec

Stratsec is a global team of experts on a mission to protect human life, well-being and the environment against cyber-driven threats.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.