• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers identify 3 hacktivist groups supporting russian interests

Researchers Identify 3 Hacktivist Groups Supporting Russian Interests

You are here: Home / General Cyber Security News / Researchers Identify 3 Hacktivist Groups Supporting Russian Interests
September 26, 2022

At least a few alleged hacktivist teams doing the job in aid of Russian pursuits are possible executing so in collaboration with state-sponsored cyber risk actors, in accordance to Mandiant.

The Google-owned danger intelligence and incident reaction agency reported with moderate self confidence that “moderators of the purported hacktivist Telegram channels ‘XakNet Workforce,”https://thehackernews.com/2022/09/”Infoccentr,’ and ‘CyberArmyofRussia_Reborn’ are coordinating their functions with Russian Main Intelligence Directorate (GRU)-sponsored cyber danger actors.”

Mandiant’s evaluation is based mostly on proof that the leakage of facts stolen from Ukrainian corporations happened within 24 hours of malicious wiper incidents undertaken by the Russian nation-condition group tracked as APT28 (aka Extravagant Bear, Sofacy, or Strontium).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

To that conclusion, 4 of the 16 info leaks from these teams coincided with disk wiping malware attacks by APT28 that included the use of a pressure dubbed CaddyWiper.

APT28, active considering the fact that at minimum 2009, is linked with the Russian army intelligence agency, the Standard Team Principal Intelligence Directorate (GRU), and drew community focus in 2016 for the breaches of the Democratic Nationwide Committee (DNC) in the operate-up to the U.S. presidential election.

APT28

While the so-identified as hacktivist teams have performed distributed denial-of-provider (DDoS) attacks and internet site defacements to focus on Ukraine, indications are that these phony personas are a front for facts operations and harmful cyber pursuits.

That said, the correct mother nature of the connection and the degree of affiliation with the Russian condition continues to be mysterious, while it implies both immediate involvement from GRU officers on their own or by way of the moderators operating the Telegram channels.

CyberSecurity

This line of reasoning is substantiated by XakNet’s leak of a “unique” complex artifact that APT28 used in its compromise of a Ukrainian network and the actuality that CyberArmyofRussia_Reborn’s data releases are preceded by APT28 intrusion functions.

The cybersecurity enterprise pointed out it also unearthed some degree of coordination amongst the XakNet Crew and Infoccentr as very well as the pro-Russia group KillNet.

“The war in Ukraine has also introduced novel options to recognize the totality, coordination, and success of Russia cyber systems, which include the use of social media platforms by threat actors,” Mandiant reported.

Located this article exciting? Adhere to THN on Facebook, Twitter  and LinkedIn to read a lot more distinctive articles we publish.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «australia looks to amend privacy rules following optus data breach Australia looks to amend privacy rules following Optus data breach
Next Post: Hackers Use NullMixer and SEO to Spread Malware More Efficiently Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.