Russian cyber-attacks look like uncontrolled internet warfare Cyber ​​warfare

The Russian military intelligence sandworm team, which has been accused of spreading computer chaos against Kremlin enemies around the world, is said to have operated a blue glass skyscraper known simply as the “tower”.

From this address, 22 Kirova Street on the outskirts of Khimki, sandworm hackers, possibly more commonly known as Unit 454555 and the “core center of special technology”, attacked the Ukrainian power system, said Emmanuel Macron’s president in France. In 2017, the UK investigated the 2018 South Korean Olympics and the 2018 Russian nerve agent attack in Salisbury.

According to cyber security experts, the same unit was involved in hacking the Democratic National Committee and Hillary Clinton’s 2016 election campaign, disguised as a hacktivist group called Fancy Bear.

On Monday, US and UK authorities accused the unit of planning cybertacks at the 2020 Tokyo Olympics and Paralympics.

They did not simply cause confusion and inconvenience. Without their alleged role in the rise of Donald Trump, they are accused of depriving thousands of Ukrainians of light and heat in the middle of winter and shutting down computer systems at a large hospital in Pennsylvania. Their exploits can be unrealistic realities of cyber warfare.

All GRU military intelligence officers, U.S. arguments of six Sandworm operatives, give details of how they took over their business.

In preparation for attacking the Olympics, they studied the tactics and style of their North Korean rivals, the Lazarus group, so that they could imitate them and cast doubt on Pyongyang.

When the UK’s Defense Science and Technology Laboratory and the Hague-based Chemical Prohibition Agency launched an investigation into the March 2018 attack on a KGB defector Sergei Skripal and his daughter Yulia by a novice nerve agent, Sandworm hackers launched a spear email from a well-known journalist. Preparing.

At least the recipients claim to have information related to the “journalist” investigation to increase the likelihood that they will click on malware-based links.

The allegations stem from a lengthy investigation by FBI analysts in the United States, the United Kingdom, Canada, Australia and New Zealand, in collaboration with Google, Cisco, Facebook and Twitter, as well as allied intelligence agencies.

According to the complaint, the investigators were able to keep a close eye on the hackers so much that it caught one of them, Anatoly Kovalev, he was doing some money laundering, Russian real estate companies, and car dealers as well as exchanging cryptocurrencies abroad, apparently for personal gain.

Thomas Reid, a professor of strategic studies at Johns Hopkins University and author of Active Major – a book published this year on disinformation operations, says that the level of accusation details reflects the degree to which GRU teams infiltrated their own networks.

“Today’s GRU indications are an incredible document,” Reed said Wrote on Twitter. “I suspect that if today’s revelations of the five-eyed intelligence community are to be considered dispensable, there must be stunning visibility about Russian military intelligence operations.”

They seem to have been significantly slouched in other ways to cover the tracks of all the effort unit its4555.

According to Eric Toler of the journalism team investigating the Bellinkat, three of the six defendants drove in the same vehicle, which is also associated with the sandworm unit.

“If you search all the people who registered their cars at this address, you will find 47 results – probably GRU hackers.” Tolar Dr..

You May Also Like

About the Author: Hanley Mallin

Internet geek. Wannabe bacon enthusiast. Web trailblazer. Music maven. Entrepreneur. Pop culture fan.

Leave a Reply

Your email address will not be published. Required fields are marked *