Russian computer pirates aim to send western companies to Ukraine, says American intelligence

Russian computer pirates aim to send western companies to Ukraine, says American intelligence

Washington – Computer pirates working for Russian military intelligence went to Western Technology and Logistics Companies involved in shipping Assistance to UkraineThe United States National Security Agency said.

Computer pirates tried to obtain details about the type of assistance that entered Ukraine The NSA report In cyber attack, which was broadcast on Wednesday night.

The cybernetic campaign sought to penetrate defense, transport and logistics companies in several Western countries, including the US, as well as ports, airports and rail systems. The report did not specify what types of Russia aid was surveys, but the allies of Ukraine have contributed significant amounts of Military and humanitarian assistance Since the war began.

More than 10,000 cameras connected to the Internet were directed, including private devices and public traffic cameras near critical transport points, such as ports, railroad centers or border crossings. Most were in Ukraine, although some were in Romania, Poland and other eastern or central countries.

The authorities did not reveal details about the success of the computer pirates or how long unnoticed. The detailed activity in the report began in 2022, the same year as Russia invaded Ukraine.

Russia is expected to continue your efforts to spy on help, and companies involved in logistics or help shipments should be on guard, according to the report, which was issued jointly by the NSA, FBI and security agencies in several allied nations.

“To defend and mitigate these threats, entities at risk should anticipate guidance,” said the NSA.

The authorities linked the activity with a Russian military intelligence unit called “elegant bear” that is Well known for their past campaigns addressed to the United States and their allies.

Computer pirates used a variety of tactics for access, including Confinementwhich implies sending authentic -looking messages to a potential victim that contains links to harmful software or requests for confidential information.

The Russian team also exploded security vulnerabilities in computer devices used in small offices and at home, networks that often lack the security measures found in larger systems.

Computer pirates did not use particularly innovative techniques, according to Grant Geyer, Clearoty cyber security company director. However, the extensive but carefully orchestrated effort gives the Russians a “granular understanding” of the help sent to Ukraine, he said.

“They have made a detailed orientation throughout the supply chain to understand which equipment moves, when and how, whether by plane, boat or rail,” Geyer said.

Russia could use the information you obtained to improve your war planning, said Geyer, or to draw more cyber or physical attacks on the supply chain to Ukraine.

The past fall, American intelligence officials issued a public newsletter Direct US companies and defense suppliers to increase security precautions after several sabotage acts in Europe that officials have blamed Russia.

The Russian Embassy in Washington did not immediately respond to the messages looking for comments.

Leave a Reply

Your email address will not be published. Required fields are marked *

two × two =