The National - News

Ukraine claims Russian security services were guilty of cyberattac­k

▶ Intelligen­ce agency in Kiev points finger at Moscow after another wave of global panic

-

Ukraine has accused Russian security services of responsibi­lity for a cyber attack last week.

The SBU, Ukraine’s state security operation, said the offensive – which started in Ukraine and spread around the world on Tuesday – was the work of the same hackers who went after the Ukrainian power grid in December.

Ukrainian politician­s were quick to blame Russia for Tuesday’s events, but a Kremlin spokesman dismissed “un- founded blanket accusation­s”.

Cyber security firms are trying to piece together who was behind the computer worm, dubbed NotPetya by some experts, which seized up computers, hit banks, disrupted shipping and shut down a chocolate factory in Australia.

The attack also hit major Russian firms, leading some cyber security researcher­s to suggest that Moscow was not behind it.

The malicious code in the virus encrypted data on computers and demanded victims pay a US$300 (Dh1,100) ransom, similar to the extortion tactic used in a global WannaCry ransomware attack in May.

Ukrainian officials and some security experts said the ransomware was a smokescree­n.

Relations between Ukraine and Russia went into freefall after Moscow’s annexation of Crimea in 2014 and the subsequent outbreak of a Kremlin-backed separatist insurgency in eastern Ukraine in which more than 10,000 people have died.

Hacking Ukrainian state institutio­ns is part of what Ukraine says is a “hybrid war” by Russia.

Moscow denies sending troops or military equipment to eastern Ukraine.

“The available data, including those obtained in cooperatio­n with internatio­nal antivirus companies, give us reason to believe that the same hacking groups are involved in the attacks, which in December 2016 attacked the financial system, transport and energy facilities of Ukraine using TeleBots and BlackEnerg­y,” the SBU said.

“This testifies to the involvemen­t of the special services of Russian Federation in this attack.”

The SBU in an earlier statement on Friday said it had seized equipment it claimed belonged to Russian agents in May and June to launch online attacks.

Referring to the $300 ransomware demand, the SBU said: “The virus is cover for a largescale attack on Ukraine. This is evidenced by a lack of a real mechanism for taking possession of the funds – enrichment was not the aim of the attack.

“The main purpose of the virus was the destructio­n of important data, disrupting the work of public and private institutio­ns in Ukraine and spreading panic among the people.”

A cyber attack in December on a Ukrainian state energy computer caused a power cut in the northern part of the capital Kiev.

The Russian foreign ministry and Federal Security Service did not immediatel­y respond to requests for comment on the latest allegation­s, but Russian lawmaker Igor Morozov told the RIA Novosti news agency that the Ukrainian charges were “fiction” and that the attacks were likely to be the work of the United States.

Russian oil major Rosneft was one of the first companies to reveal it had been compromise­d by the virus, and sources said computers at state gas giant Gazprom were also infected.

The SBU’s accusation­s chime with some of the findings of the cybersecur­ity firm ESET in Slovakia, which said in research published on Friday that the Telebots group – which has links to BlackEnerg­y – was behind the attack.

This testifies to the involvemen­t of the special services of Russia in this attack

“Collecting ransom money was never the top priority for the TeleBots group,” it said, suggesting Ukraine was the target but the virus spread globally as “affected companies in other countries had VPN connection­s to their branches, or to business partners, in Ukraine.

“The TeleBots group continues to evolve in order to conduct disruptive attacks against Ukraine,” it said.

“Prior to the outbreak, the Telebots group targeted the financial sector in the main. The latest outbreak was directed against businesses in Ukraine, but they apparently underestim­ated the malware’ spreading capabiliti­es. That’s why the malware went out of control.”

Most of the organisati­ons affected by the attack recovered within 48 hours.

Meanwhile, , in a joint security report from the department of homeland security and the FBI, the US warned American industrial firms about hacking activity targeting the nuclear and energy sectors.

Since at least May, hackers used phishing emails to “harvest credential­s” so they could gain access to networks of their targets, according to the report released on Thursday.

The report said that in some cases hackers succeeded in compromisi­ng the networks of their targets, though it did not identify the victims.

 ?? Vadim Ghirda / AP ?? A real time cyber attacks world map at Bitdefende­r headquarte­rs in Bucharest. A new strain of malicious ransom software appears to have been sown in Ukraine
Vadim Ghirda / AP A real time cyber attacks world map at Bitdefende­r headquarte­rs in Bucharest. A new strain of malicious ransom software appears to have been sown in Ukraine

Newspapers in English

Newspapers from United Arab Emirates