Yes, hackers created fake pages for each institution and sent emails to scientists to force them to issue important passwords. The publication reports that it is unclear whether the attacks were successful. According to researchers of cybersecurity and Western government officials, Cold River intensified its hacking campaign against Kyiv allies after the Russian invasion of the Russian Federation. The attack began when experts of the IAEA went to the Zaporizhzhya NPP, which is now in occupation.
Journalists write that the Cold River group has first got into the field of view of intelligence experts after attack on the UK Ministry of Foreign Affairs in 2016. According to the senior vice -resident of the American company Crowdstrike, this hacker group is involved in the direct support of the Kremlin's information operations in the material that according to many officials of the West, the Russian government is a world leader in the field of attacks of hackers and uses cyberbers .
So Moscow wants to get a competitive advantage. The publication writes that five cybersecurity experts, which journalists communicated with, confirmed the involvement of the Cold River group to attempt to break nuclear laboratories. It is reported that in recent years, Cold River has made several mistakes that allowed cybersecurity analysts to establish the exact location and personality of one of its members. This gives the most accurate indication of the Russian origin of the group.
Journalists write that several personal e-mail addresses used for Cold River attacks belong to Andrew Korintsy, a 35-year-old IT specialist and a culture-worker. Billy Leonard, Security Engineer from Google Analysis Group, said the root is exactly related to Cold River attacks. Vinzas Chizunas, a NISOS safety researcher who also linked the roots of the root with Cold River's activities, found a number of Russian-language online forums where the root discussed the attacks of hackers.
Journalists talked with the root. He confirmed that the accounts belonged to him, but recognized the involvement in Cold River. He said that for the only experience of hacking he was fined by the Russian court. However, journalists were able to confirm the roots of Cold River themselves, using the data collected using Constella Intelligence and Domaintools cybersecurity research platforms that help identify website owners.
As it turned out, the roots of the roots are registered on numerous websites used in hacker campaigns Cold River between 2015 and 2020. It is unclear whether the root has participated in hacker operations since 2020. Earlier, Focus wrote that hackers broke the topic of Belarus and merged Pry-tests of Lukashenko and his son. Yes, Alexander and Mykola Lukashenko received certificates on the eve of meetings with Vladimir Putin. The time of issuance shows that they were discharged without analyzes.
All rights reserved IN-Ukraine.info - 2022