A cautiously coordinated cyber-attack on Lithuania that occurred previous week has been described by the republic’s defense minister as one of the “most intricate” security incidents to goal the Baltic state in the latest background.
On the evening of December 9, cyber-criminals breached various written content management systems to achieve access to 22 diverse websites operated by Lithuania’s general public sector. The attackers then printed articles or blog posts that contains misinformation on the websites.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Amid the bogus news posted by the threat actors was a story that alleged a Polish diplomat, carrying illegal drugs, weapons, and dollars, had been detained at the Lithuanian border. This fictitious story was shared on the web site of the Condition Border Guard Service (VSAT).
Yet another write-up claimed that corruption had been uncovered in the Šiauliai airport, where NATO’s Baltic air-policing mission is housed.
A 3rd piece of misinformation promulgated in the attack inflated figures to make it show up as though extra Lithuanians had been drafted into the military than was the scenario.
An investigation into the attack by the Defense Ministry’s Nationwide Cyber Security Centre (NKSC) discovered that the sites focused by the attackers had been typically run by regional municipalities.
In a assertion published on Wednesday, Lithuania’s defense minister, Arvydas Anušauskas, described the digital assault as one of the “major and most intricate” cyber-attacks to strike the republic in new decades.
Anušauskas extra that the attack, which took spot “on the eve of the government’s transition […] was ready in progress and with a purpose in mind.”
Immediately after hacking into the methods and posting the fake content articles, the attackers released an email spoofing campaign to unfold the misinformation as considerably as feasible. The attackers impersonated the defense and international ministries as nicely as the Šiauliai Municipality Administration to send out out email messages made up of back links to the fallacious stories.
“This shows enormous gaps in cybersecurity of the public sector,” stated Anušauskas.
Subsequent the attack, the NKSC has submitted a variety of cybersecurity recommendations to municipalities. These incorporate actively exploring for vulnerabilities, limiting access to articles administration techniques, putting in a firewall, and staying away from the use of passwords that are straightforward to guess.
Some components of this short article are sourced from:
www.infosecurity-magazine.com