Russian Gangsters Are Trying To Force Many Networks

[ad_1]
Availability of The destruction of Russia SolarWinds spy campaign set advanced lighting Chain theft Moscow foreign trade skills. But now it is clear that, all the time SolarWinds Hate and to its detriment, another group of Kremlin hackers has been working every day, using basic but transparent methods to unlock almost any network that can be found in the US and on the world wide web.
On Thursday the NSA, the FBI, DHS’s Cybersecurity and Infource Security Agency, and the National Cybersecurity Center in the UK released a statement. collaborative advice warnings of hundreds of armed robbers around the world, all produced by Unit 26165 of the Russian military GRU, also called Fancy Bear or APT28. The scam has set up a number of corporations, including governments and governments, security contractors, political parties and charities, aid companies, power companies, universities, law enforcement agencies, and the media. In other words, almost all of the online entertainment sites.
The phishing campaign has used a number of methods against these targets, comparing people’s names and passwords to gain access to the site. But security agencies warn that the Fancy Bear campaign has disrupted several agencies and destroyed emails from them — and that it has not ended. “This tremendous creative work of collecting and destroying information, information available and much more, must continue, globally,” NSA director Rob Joyce wrote in a statement following the advice.
The GRU 26165 group, more than the SVR spy spies who campaigned for SolarWinds, has a history of highly disruptive fraud. Fancy Bear was behind the falsehoods and losses that have occurred wanted everyone from the Democratic National Committee and the Clinton Campaign in 2016 for International Olympic Committee and Worldwide Anti-Doping Agency. But there is no reason to believe that these recent efforts are going beyond traditional intelligence, says John Hultquist, Mandiant Vice President and longtime GRU employee.
“This intervention does not mean using the shenanigans we consider when considering the GRU,” says Hultquist. But that does not mean that fraudulent campaigns are unnecessary. They see interoperable technology, which lists IP addresses and malware that users steal, in an attempt to add to the “controversy” over public access. “I have a clear reminder that the GRU is still alive, operating in this kind of environment, and seems to be focusing more on intelligence interests such as policymakers, ambassadors, and security companies.”
The inclusion of regional targets in the theft process raises the red flag, largely due to this another GRU stealth group, Sandworm, remains the only scammers to start shutting down, destruction of power plants in Ukraine in 2015 and 2016. The Department of Energy warned in private in early 2020 that the burglars had seized the “electronic corporation” in the US before Christmas in 2019. The instructions contained IP addresses that later corresponded to GRU Unit 26165, as was first reported by WIRED last year. “I get worried every time I see a GRU in the air,” says Hultquist. Even so, she still finds simple espionage as a source of encouragement. “It is important to remember that Russia is a world of petroleum. It has a keen interest in the electronics industry. This will be an important part of gathering intellectuals.”
GRU spying on surveillance could be “opportunistic” rather than counterproductive, says Joe Slowik, who directs intelligence to security firm Gigamon and sees a link between the Department of Energy’s warning and GRU’s. He thinks the group will be able to access any network they can find before sending a chance to other Kremlin-targeted missiles, such as spies or intruders. “They have a responsibility to ‘come out and give us access to organizations that are interested in them,” Slowik said. “They then stay there or hand out parties that deal with the issues involved, depending on how much they can get.”
[ad_2]
Source link



