Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

Serhii Demediuk (pictured) said in an interview with The Associated Press that Russian-controlled digital saboteurs are stepping up attacks on the Central Elections Commission and its employees, trying to penetrate electronic systems in order to manipulate information about the March 31 election.

“On the eve of the election and during the counting of votes there will be cyberattacks on certain objects of critical infrastructure. This applies to the work of the polling stations themselves, districts, and the CEC,” he said.

“From what we are seeing, it will be manipulation aimed at distorting information about the results of elections, and calling the elections null or void,” Demediuk said.

The presidential election will be a test of Ukraine’s capacity for order. Russia has consistently portrayed Ukraine under President Petro Poroshenko as corrupt and poorly run, and undermining the election’s credibility could serve Russia’s propaganda interests.

Ukraine aspires to join the European Union and NATO, and an orderly and credible election could show that it is approaching the democratic standards that those organisations consider key.

Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity.

Since 2014, its energy, transportation and banking systems have been attacked. The malicious program NotPetya hit thousands of computers not only in Ukraine, which was the main target of the attack, but throughout the world.

Asked about Demediuk’s claims, Kremlin spokesman Dmitry Peskov said Wednesday 13th February: “We know nothing about this. The only thing I can say is that we’ve been hearing similar statements from different countries in the world. This is becoming a sort of mania or phobia but it has nothing to do with reality. Russia has never had anything to do with any types of cybercrimes.”

None of the 44 registered candidates appear to have enough support to win an absolute majority, which would force a runoff three weeks later.

The activity of hackers has noticeably increased during the election campaign six weeks before the elections, Demediuk said. He said some of the hackers are impersonating top officials in order to penetrate the computers of commission members and technical staff.

“Every day cyber incidents that come from Russia or from other countries are increasing. Why from other countries? Because our opponents and enemies are not stupid, they use different methods to anonymize and distort information,” he said.

Kiev says the hackers are combining usual digital espionage methods with attempts to manipulate or intimidate.

“We see a combination of classic cyberattacks, such as those previously committed, with misinformation and social engineering,” Demediuk said.

In 2015 Ukraine was the site of the world’s first confirmed attack on a power system. The hackers succeeded in paralysing 30 electrical substations and leaving around 230,000 people without power.

Demediuk said malicious Russian software was often tested in Ukraine, then later used in other countries.

“Ukraine is the launching pad where it all begins ... they first of all test us. We are the enemy for them, and they are for us. And so the use of any cyber weapon is a priority. And if it works with us, they then upgrade it to the requirements and infrastructure and use it in this or that country,” said Demediuk.

He said Ukraine continues to monitor the activities of the group nicknamed APT28 or Fancy Bear, which the US Department of Justice and a host of independent reports have tied to Russia’s military intelligence agency, often called the GRU.

“We follow them, we have indicators with which we can identify and see them. They constantly carry out their activities here,” he said.

APNews

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« IoT Is In The Dark When It Comes To ePrivacy
Dating Sites Fraudster Alert »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.