• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Tuesday, June 6, 2023
Flyy News
No Result
View All Result
  • Home
  • World
  • Business
  • Entertainment
  • Health
  • Food
  • Politics
  • Tech
  • Science
  • Travel
  • Fashion
  • Lifestyle
  • Home
  • World
  • Business
  • Entertainment
  • Health
  • Food
  • Politics
  • Tech
  • Science
  • Travel
  • Fashion
  • Lifestyle
No Result
View All Result
Flyy News
No Result
View All Result
Home Tech

Microsoft links Russia’s military to cyberattacks in Poland and Ukraine

flyynews by flyynews
November 11, 2022
in Tech
0
Ukraine is underneath assault by means of hacking equipment repurposed from Conti cybercrime staff
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


Microsoft links Russia’s military to cyberattacks in Poland and Ukraine

Getty Images

Microsoft on Thursday fingered Russia’s military intelligence arm as the likely culprit behind ransomware attacks last month that targeted Polish and Ukrainian transportation and logistics organizations.

If the assessment by members of the Microsoft Security Threat Intelligence Center (MSTIC) is correct, it could be cause for concern for the US government and its European counterparts. Poland is a member of NATO and a staunch supporter of Ukraine in its bid to stave off an unprovoked Russian invasion. The hacking group the software company linked to the cyberattacks—known as Sandworm in wider research circles and Iridium in Redmond, Washington—is one of the world’s most talented and destructive and is widely believed to be backed by Russia’s GRU military intelligence agency.

Sandworm has been definitively linked to the NotPetya wiper attacks of 2017, a global outbreak that a White House assessment said caused $10 billion in damages, making it the most costly hack in history. Sandworm has also been definitively tied to hacks on Ukraine’s power grid that caused widespread outages during the coldest months of 2016 and again in 2017.

Enter Prestige

Last month, Microsoft said that Poland and Ukraine transportation and logistics organizations had been the target of cyberattacks that used never-before-seen ransomware that announced itself as Prestige. The threat actors, Microsoft said, had already gained control over the victim networks. Then in a single hour on October 11, the hackers deployed Prestige across all its victims.

Once in place, the ransomware traversed all files on the infected computer’s system and encrypted the contents of files that ended in .txt, .png, gpg, and more than 200 other extensions. Prestige then appended the extension .enc to the existing extension of the file. Microsoft attributed the attack to an unknown threat group it dubbed DEV-0960.

On Thursday, Microsoft updated the report to say that based on forensic artifacts and overlaps in victimology, tradecraft, capabilities, and infrastructure, researchers determined DEV-0960 was very likely Iridium.

Advertisement

“The Prestige campaign may highlight a measured shift in Iridium’s destructive attack calculus, signaling increased risk to organizations directly supplying or transporting humanitarian or military assistance to Ukraine,” MSTIC members wrote. “More broadly, it may represent an increased risk to organizations in Eastern Europe that may be considered by the Russian state to be providing support relating to the war.”

READ ALSO

Mass exploitation of critical MOVEit flaw is ransacking orgs big and small

Proactive and predictive tools for transformation

Thursday’s update went on to say that the Prestige campaign is distinct from destructive attacks in the past two weeks that used malware tracked as AprilAxe (ArguePatch)/CaddyWiper or Foxblade (HermeticWiper) to target multiple critical infrastructures in Ukraine. While the researchers said they still don’t know what threat group is behind those acts, they now have enough evidence to finger Iridium as the group behind the Prestige attacks. Microsoft is in the process of notifying customers who have been “impacted by Iridium but not yet ransomed,” they wrote.

Underscoring the sophistication of the attacks, Iridium members used multiple methods for deploying Prestige on the targeted networks. They included:

Windows scheduled tasks

Microsoft

encoded PowerShell commands, and

Microsoft

Default Domain Group Policy Objects

Microsoft

“Most ransomware operators develop a preferred set of tradecraft for their payload deployment and execution, and this tradecraft tends to be consistent across victims, unless a security configuration prevents their preferred method,” MSTIC members explained. “For this Iridium activity, the methods used to deploy the ransomware varied across the victim environments, but it does not appear to be due to security configurations preventing the attacker from using the same techniques. This is especially notable as the ransomware deployments all occurred within one hour.”

The post contains technical indicators that can help people figure out if they have been targeted.

Go to discussion…



Source_link

Related Posts

Mass exploitation of critical MOVEit flaw is ransacking orgs big and small
Tech

Mass exploitation of critical MOVEit flaw is ransacking orgs big and small

June 6, 2023
Proactive and predictive tools for transformation
Tech

Proactive and predictive tools for transformation

June 6, 2023
First impressions: Yes, Apple Vision Pro works and yes, it’s good.
Tech

First impressions: Yes, Apple Vision Pro works and yes, it’s good.

June 6, 2023
iOS 17 is compatible with these iPhones
Tech

iOS 17 is compatible with these iPhones

June 5, 2023
The RTX 3060 continues its climb to the top of the Steam survey; Windows 11 sees more gains
Tech

The RTX 3060 continues its climb to the top of the Steam survey; Windows 11 sees more gains

June 5, 2023
Instagram reinstates Robert Kennedy Jr. after launch of presidential bid
Tech

Instagram reinstates Robert Kennedy Jr. after launch of presidential bid

June 5, 2023
Next Post
The Iceman Was Unique, We Thought. But Others Could Follow : ScienceAlert

The Iceman Was Unique, We Thought. But Others Could Follow : ScienceAlert

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Angel -Dave Curl – Official Music Video 2022

Angel -Dave Curl – Official Music Video 2022

November 17, 2022
Worker retention statistics that may marvel you

Worker retention statistics that may marvel you

September 16, 2022
Proud By Cytonic Rhymes – Official Music 2022

Proud By Cytonic Rhymes – Official Music 2022

November 25, 2022
Wanaka – Another Spoon Official Music Video

Wanaka – Another Spoon Official Music Video

October 15, 2022
Sweet Bennie Ray – Whole Lot (Official Music Video)

Sweet Bennie Ray – Whole Lot (Official Music Video)

December 22, 2022

About Us

Welcome to Flyy News The goal of Flyy News is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow us

Categories

  • Business
  • Entertainment
  • Fashion
  • Food
  • Gaming
  • Health
  • Lifestyle
  • Politics
  • Reviews
  • Science
  • Tech
  • Travel
  • World

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

  • Mass exploitation of critical MOVEit flaw is ransacking orgs big and small
  • SEC sues Coinbase over exchange and staking programs, stock drops 15%
  • Sicilian Purslane Salad – Sharon Palmer, The Plant Powered Dietitian
  • Why Some Republican Candidates Might Not Make The Debate Stage

Copyright © 2022 Flyynews.com | All Rights Reserved.

No Result
View All Result
  • Home
  • World
  • Business
  • Entertainment
  • Health
  • Food
  • Politics
  • Tech
  • Science
  • Travel
  • Fashion
  • Lifestyle

Copyright © 2022 Flyynews.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT