Ukraine points finger at Russian security
services in recent cyber attack
Send a link to a friend
[July 01, 2017]
By Pavel Polityuk
KIEV (Reuters) - Ukraine said on Saturday
that Russian security services were involved in a recent cyber attack on
the country, with the aim of destroying important data and spreading
panic.
The SBU, Ukraine's state security service, said the attack, which
started in Ukraine and spread around the world on Tuesday, was by the
same hackers who attacked the Ukrainian power grid in December 2016.
Ukrainian politicians were quick to blame Russia for Tuesday's attack,
but a Kremlin spokesman dismissed "unfounded blanket accusations".
Cyber security firms are trying to piece together who was behind the
computer worm, dubbed NotPetya by some experts, which conked out
computers, hit banks, disrupted shipping and shut down a chocolate
factory in Australia.
The attack also hit major Russian firms, leading some cyber security
researchers to suggest that Moscow was not behind it.

The malicious code in the virus encrypted data on computers, and
demanded victims pay a $300 ransom, similar to the extortion tactic used
in a global WannaCry ransomware attack in May. But Ukrainian officials
and some security experts say the ransomware feature was likely a
smokescreen.
Relations between Ukraine and Russia went into freefall after Moscow's
annexation of Crimea in 2014 and the subsequent outbreak of a
Kremlin-backed separatist insurgency in eastern Ukraine that has killed
more than 10,000 people.
Hacking Ukrainian state institutions is part of what Ukraine says is a
"hybrid war" by Russia on Kiev. Russia denies sending troops or military
equipment to eastern Ukraine.
"The available data, including those obtained in cooperation with
international antivirus companies, give us reason to believe that the
same hacking groups are involved in the attacks, which in December 2016
attacked the financial system, transport and energy facilities of
Ukraine using TeleBots and BlackEnergy," the SBU said.
"This testifies to the involvement of the special services of Russian
Federation in this attack."
The SBU in an earlier statement on Friday said it had seized equipment
it said belonged to Russian agents in May and June to launch cyber
attacks against Ukraine and other countries.
Referencing the $300 ransomware demand, the SBU said "the virus is cover
for a large-scale attack on Ukraine. This is evidenced by a lack of a
real mechanism for taking possession of the funds ... enrichment was not
the aim of the attack."

[to top of second column] |

A man types on a computer keyboard in front of the displayed cyber
code in this illustration picture taken on March 1,
2017.REUTERS/Kacper Pempel/Illustration

"The main purpose of the virus was the destruction of important
data, disrupting the work of public and private institutions in
Ukraine and spreading panic among the people."
A cyber attack in December on a Ukrainian state energy computer
caused a power cut in the northern part of the capital Kiev.
The Russian foreign ministry and Federal Security Service did not
immediately respond to requests for comment on the latest
allegations.
Russian oil major Rosneft <ROSN.MM> was one of the first companies
to reveal it had been compromised by the virus and sources told
Reuters on Thursday computers at state gas giant Gazprom <GAZP.MM>
had also been infected.
The SBU's accusations chime with some of the findings of the cyber
security firm ESET in Slovakia, which said in research published
online on Friday that the Telebots group -- which has links to
BlackEnergy -- was behind the attack.
"Collecting ransom money was never the top priority for the TeleBots
group," it said, suggesting Ukraine was the target but the virus
spread globally as "affected companies in other countries had VPN
connections to their branches, or to business partners, in Ukraine."
"The TeleBots group continues to evolve in order to conduct
disruptive attacks against Ukraine," it said.

"Prior to the outbreak, the Telebots group targeted mainly the
financial sector. The latest outbreak was directed against
businesses in Ukraine, but they apparently underestimated the
malware' spreading capabilities. That's why the malware went out of
control."
(Additional reporting by Alexander Winning in Moscow and Jim Finkle
in Toronto; writing by Matthias Williams; Editing by Jeremy Gaunt)
[© 2017 Thomson Reuters. All rights
reserved.]
Copyright 2017 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed. |