Ukraine Hackers Disrupt Putin's Birthday

Russian state media company VGTRK, which owns and operates the country's main national TV stations and its Rossiya-24 rolling 24-hours news channel was not available online on Monday 7th October. This was the result of a targeted attack, according to Ukrainian government sources.

Ukrainian hackers temporarily disabled Russian state television and radio online broadcasting services on Monday 7th, a date coinciding with Russian president Vladimir Putin’s 72nd birthday.

The attack affected state broadcaster VGTRK and disrupted internal services such as telephones as well as the online streaming services of prominent television and radio channels including Russia-1 and Russia-24.

VGTRK, which has said that its online service had come under cyber attack over-night and whose news channels provide many Russians with news on the war in Ukraine, did not immediately respond to a Reuters request for comment.

A Ukrainian government source said Ukrainian hackers were responsible for the incident, which coincided with Russian President Vladimir Putin's 72nd birthday.

"Ukrainian hackers 'congratulated' Putin on his birthday by carrying out a large-scale attack on the all-Russian state television and radio broadcasting company," the source told Reuters, asking not to be named.

Russian news outlet Gazeta.ru cited an unnamed source as saying that the cyberattack had targeted the online and internal services of VGTRK, which also owns and operates radio stations and many regional TV channels.

"Online broadcasting and internal services are down and even the Internet and telephony are not working. It's going to take a long time to fix," it quoted the source as saying.

Reuters     |     The Hacker News     |     Politico     |     SIlicon     |     The Moscow Times

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« US Might Legislate To Break Up Google
TikTok Faces Legal Challenge Over Teenage Mental Health Problems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Totalsec

Totalsec

Totalsec is a Grupo Salinas company with a team of professionals in cybersecurity and information security providing Security Consulting, Solutions Integration, and Managed Security Services.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.