GRU 26165 is accused of distributing phishing emails containing false professional information and receiving stolen accounts for access to systems. In particular, the unit, also known as APT 28 and Fancy Bear, has conducted a harmful cybercamping against state and private organizations in NATO countries since 2022. The National Cybersecurity Center of Great Britain (NCSC) has called on private companies involved in assistance to "take immediate self -defense measures.
" The Russians used road cameras. It is reported that from about 10,000 cameras, access near "military facilities and railway stations to track the movement of materials to Ukraine", of which 80% are located in Ukraine and 10% in Romania. 4% of the attacks were directed in Poland, 2. 8% in Hungary and 1. 7% in Slovakia. The location of the rest of the cameras that was directed is not reported. It is noted that evil would give access to the "instant image" of camera images.
Moreover, other attempts were made to collect confidential information on cargo, such as train schedule and transport manifestos. In one of the cases, the Russians tried to use voice phishing to access privileged accounts, giving themselves out for an IT service. Paul Chicester, NCSC Operation Director, said: "This malicious campaign of Russian military intelligence poses a serious threat to the attacks that are directed, in particular for those involved in assisting Ukraine.
" Now the victims are advised to strengthen monitoring, use multifactorial authentication with reliable factors such as access keys, and ensure prompt use of security updates. The Russian unit was previously accused of leakage of the World Anti -Doping Agency, and it played a key role in the 2016 cyberattack at the US National Democratic Party Committee. We will remind, the journalist and editor -in -chief of the edition "Censor.
All rights reserved IN-Ukraine.info - 2022