• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers identify 3 hacktivist groups supporting russian interests

Researchers Identify 3 Hacktivist Groups Supporting Russian Interests

You are here: Home / General Cyber Security News / Researchers Identify 3 Hacktivist Groups Supporting Russian Interests
September 26, 2022

At least a few alleged hacktivist teams doing the job in aid of Russian pursuits are possible executing so in collaboration with state-sponsored cyber risk actors, in accordance to Mandiant.

The Google-owned danger intelligence and incident reaction agency reported with moderate self confidence that “moderators of the purported hacktivist Telegram channels ‘XakNet Workforce,”https://thehackernews.com/2022/09/”Infoccentr,’ and ‘CyberArmyofRussia_Reborn’ are coordinating their functions with Russian Main Intelligence Directorate (GRU)-sponsored cyber danger actors.”

Mandiant’s evaluation is based mostly on proof that the leakage of facts stolen from Ukrainian corporations happened within 24 hours of malicious wiper incidents undertaken by the Russian nation-condition group tracked as APT28 (aka Extravagant Bear, Sofacy, or Strontium).

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

To that conclusion, 4 of the 16 info leaks from these teams coincided with disk wiping malware attacks by APT28 that included the use of a pressure dubbed CaddyWiper.

APT28, active considering the fact that at minimum 2009, is linked with the Russian army intelligence agency, the Standard Team Principal Intelligence Directorate (GRU), and drew community focus in 2016 for the breaches of the Democratic Nationwide Committee (DNC) in the operate-up to the U.S. presidential election.

APT28

While the so-identified as hacktivist teams have performed distributed denial-of-provider (DDoS) attacks and internet site defacements to focus on Ukraine, indications are that these phony personas are a front for facts operations and harmful cyber pursuits.

That said, the correct mother nature of the connection and the degree of affiliation with the Russian condition continues to be mysterious, while it implies both immediate involvement from GRU officers on their own or by way of the moderators operating the Telegram channels.

CyberSecurity

This line of reasoning is substantiated by XakNet’s leak of a “unique” complex artifact that APT28 used in its compromise of a Ukrainian network and the actuality that CyberArmyofRussia_Reborn’s data releases are preceded by APT28 intrusion functions.

The cybersecurity enterprise pointed out it also unearthed some degree of coordination amongst the XakNet Crew and Infoccentr as very well as the pro-Russia group KillNet.

“The war in Ukraine has also introduced novel options to recognize the totality, coordination, and success of Russia cyber systems, which include the use of social media platforms by threat actors,” Mandiant reported.

Located this article exciting? Adhere to THN on Facebook, Twitter  and LinkedIn to read a lot more distinctive articles we publish.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «australia looks to amend privacy rules following optus data breach Australia looks to amend privacy rules following Optus data breach
Next Post: Hackers Use NullMixer and SEO to Spread Malware More Efficiently Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.