Archive for the ‘Ukraine’ Category

Ukraine’s ransomware attack was a ruse to hide culprit’s identity, researchers say – Washington Post

The cyber attack that crippled computer systems in Ukraine and other countries this week employed a ruse the appearance of being ransomware that seems designed to deflect attention from the attackers true identity, security researchers said.

And many companies initially fell for it.

The first reports out of cybersecurity firms on Monday, when news of the attack hit, was that a new variant of WannaCry, a virus that encrypted data and demanded a ransom to restore it, was on the loose.

In fact, a number of researchers said this week, the malware which researchers are calling NotPetya does not encrypt data, but wipes its victims computers. If the data is not backed up, its lost, they said.

It definitely wasnt ransomware and wasnt financially motivated, said Jake Williams, founder of Rendition Infosec, a cybersecurity firm, which has analyzed the virus. The goal was to cause disruption in computer networks.

Moreover, the email address to make a payment to retrieve data is no longer accessible, said Matt Suiche, a hacker and founder of Comae Technologies, a cybersecurity firm.

He said in a blog post this week that the ransomware feint was probably a way to make people think some mysterious hacker group was behind the attack rather than a nation state.

The fact of pretending to be a ransomware while being in fact a nation-state attack ... is in our opinion a very subtle way for the attacker to control the narrative of the attack, Suiche said.

Security researchers cautioned that it is too early to know for sure who is behind it. But some say that the targeting and distribution method of the malware point to Russia.

More than half the victimized computers were in Ukraine, including banks, energy firms and an airport.

Russia, which has annexed Crimea and has backed separatists in eastern Ukraine, has carried out an aggressive campaign of cyberattacks and harassment there.

In December, Russian government hackers disrupted the power grid in Kiev. A year earlier, they knocked out power in western Ukraine.

In this case, to get into victims computers, attackers infected a financial software program in Ukraine, called MEDoc, that delivers software updates to businesses through the Internet.

Thats called a watering hole attack, which targets users who navigate to the site for updates or to browse. It is also a tactic that Russian government hackers have used in the past to compromise industrial control system networks, Williams noted.

MEDoc is one of only two software options Ukrainian businesses have to pay their taxes, noted Lesley Carhart, an information security expert.

This was a clever choice for several reasons, she noted in a blog post, including that the distribution base within the country was extremely comprehensive as many companies used the software.

NotPetya did not spread across the open Internet, she said in an email. Its tactic was to compromise a few computers inside a network once the hacker got in, say, by delivering the malware through MEDoc. Then it could rapidly spread to other computers in the same network using a variety of other methods.

While most patient zero computers were in Ukraine ... the corporate networks those computers [connect to] could potentially span the globe, and infection could also spread to any customers, partners, or vendors with whom they had unrestricted network connections and shared accounts, she said.

That might explain how U.S. pharmaceutical giant Merck, the Danish shipping firm Maerskeven and the Russian oil company Rosneft became infected.

The Rosneft infection might be an unintended consequence collateral damage, Williams said.

Valentyn Petrov, head of the information security service at Ukraines National Security and Defense Council, said that the attacks timing, on the eve of Ukraines Constitution Day, indicated this was a political attack.

We are in an interesting test phase in which Russia is using modern cyberweapons, Petrov said, and everyone is interested to see how it is working and how threats can be countered.

David Filipov in Moscow contributed to this report.

Visit link:
Ukraine's ransomware attack was a ruse to hide culprit's identity, researchers say - Washington Post

Russia may have directed cyberattack against Ukraine – The Recorder

PARIS The cyberattack that has locked up computers around the world while demanding a ransom may not be an extortion attempt after all, but an effort to create havoc in Ukraine, security experts say.

There may be a more nefarious motive behind the attack, Gavin OGorman, an investigator with U.S. antivirus firm Symantec, said in a blog post. Perhaps this attack was never intended to make money, rather to simply disrupt a large number of Ukrainian organizations.

The rogue program landed its heaviest blows on the Eastern European nation, where the government, dozens of banks and other institutions were sent reeling. It disabled computers at government agencies, energy companies, cash machines, supermarkets, railways and communications providers. Many of these organizations had recovered by Thursday.

The program, known by a variety of names, including NotPetya, initially appeared to be ransomware, a type of malicious software that encrypts its victims data and holds it hostage until a payment is made, usually in bitcoins, the hard-to-trace digital currency often used by criminals.

But OGorman and several other researchers said the culprits would have been hard-pressed to make money off the scheme. They appear to have relied on a single email address that was blocked almost immediately and a single bitcoin account that has collected the relatively puny sum of $10,000.

Others, such as Russian anti-virus firm Kaspersky Lab, said clues in the code suggest the programs authors would have been incapable of decrypting the data, further indicating the ransom demands may have been a smoke screen.

The timing was intriguing too: The attack came the same day as the assassination of a senior Ukrainian military intelligence officer and a day before a national holiday celebrating the new Ukrainian constitution signed after the breakup of the Soviet Union.

Tensions have been running high between Russia and Ukraine, with Moscow seizing Crimea in 2014 and pro-Russian separatists fighting government forces for control of eastern Ukraine.

Russia has long been suspected of engineering earlier cyberattacks against Ukraine, including the hack of its voting system ahead of 2014 national elections and an assault that knocked its power grid offline in 2015.

Ransomware or not, computer specialists worldwide were still wrestling with its consequences, with varying degrees of success.

Danish shipping giant A.P. Moller-Maersk, one of the global companies hit hardest, said Thursday that most of its terminals are running again, though some are operating in a limited way or more slowly than usual.

Problems have been reported across the shippers global business, from Mobile, Alabama, to Mumbai in India. At Mumbias Jawaharlal Nehru Port, hundreds of containers could be seen piled up.

See the article here:
Russia may have directed cyberattack against Ukraine - The Recorder

Ports recover, but Ukraine still disrupted by cyberattack – News & Observer


News & Observer
Ports recover, but Ukraine still disrupted by cyberattack
News & Observer
In a statement posted to its website , A.P. Maersk-Moller said Friday it is "pleased to report that our operations are now running close to normal again." But back in Ukraine, the pain continues. Officials have assured the public that the malware ...

and more »

Read more from the original source:
Ports recover, but Ukraine still disrupted by cyberattack - News & Observer

Eurovision: Ukraine facing fine over Russia row – BBC News


BBC News
Eurovision: Ukraine facing fine over Russia row
BBC News
Eurovision Song Contest bosses are fining Ukraine over its organisation of this year's competition in Kiev. The European Broadcasting Union (EBU) said Ukraine's state broadcaster UA:PBC should pay a "substantial" fine because of "severe delays which ...
Ukraine faces big fine after Russia Eurovision rowReuters
Ukraine faces Eurovision finePOLITICO.eu
Eurovision Song Contest: Ukraine face MASSIVE fines for 'endangering' show over Russia rowExpress.co.uk
RT -esctoday.com
all 15 news articles »

Read the original:
Eurovision: Ukraine facing fine over Russia row - BBC News

Cyberattack hits Ukraine, Europe, U.S.; hackers use suspected …

PARIS -- A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard.

Company and government officials reported serious intrusions at the Ukrainian power grid, banks and government offices, where one senior official posted a photo of a darkened computer screen and the words, "the whole network is down."

The attack was reportedly affecting websites in Great Britain, Norway and India, as well, and at least one major U.S. company said it was affected. The New Jersey-based pharmaceutical company Merck confirmed that its computer network was compromised as part of what it called a "global hack," and said it was investigating.

Ukraine's government said the cyberattack was the biggest ever to hit the country, and an adviser to the Minister of Internal Affairs was quick to suggest the attacks appeared to have originated from Russia.

However, Russia's Rosneft energy company also reported falling victim to the hacking, saying it had narrowly avoided major damage.

Play Video

CNET's Dan Ackerman joins CBSN to explain the steps computer owners need to take to help keep their data secure from hackers and ransomware.

"The hacking attack could have led to serious consequences but neither the oil production nor the processing has been affected thanks to the fact that the company has switched to a reserve control system," the company said.

U.S. cybersecurity expert Chris Hadnagy, CEO of Social-Engineer Inc., told CBS News, "We've been following it very closely and it is ... massive. It's attacking a lot of industrial areas, airports, banks, power grids in the Ukraine and in Russia."

The U.S. Department of Homeland Security issued a statement saying it is monitoring reports of attacks "affecting multiple global entities" and is "coordinating with our international and domestic cyber partners," offering confidential analysis and technical support.

The number of companies and agencies reportedly affected by the ransomware campaign piled up fast, as the electronic rampage appeared to be rapidly snowballing into a real-world world crisis.

Shipping company A.P. Moller-Maersk said every branch of its business was affected. "We are responding to limit impact on customers and to uphold operations," the company said in a statement posted on Twitter.

"We are talking about a cyberattack," said Anders Rosendahl, a spokesman for the Copenhagen-based shipping group. "It has affected all branches of our business, at home and abroad."

Dutch daily Algemeen Dagblaad said container ship terminals in Rotterdam run by a unit of Maersk were also affected.

The Ukrainian Interior Ministry adviser said the cyberattacks were using a modified version of the "WannaCry" malware that was found to be at the heart of a massive, global attack by hackers earlier this year -- one that cost companies billions of dollars.

Technology experts said in May that there was evidence North Korean hackers could have been behind that malware assault.

Play Video

Cybersecurity experts say North Korea may be to blame for the unprecedented global "ransomware" attack. The hacking has crippled computer systems...

Ukrainian Deputy Prime Minister Pavlo Rozenko on Tuesday posted a picture of a darkened computer screen to Twitter, saying that the computer system at the government's headquarters had been shut down.

There was very little information on Tuesday about who might be behind the latest disruption, but technology experts who examined screenshots circulating on social media said it bears the hallmarks of ransomware, the name given to programs that hold data hostage by scrambling it until a payment is made.

"A massive ransomware campaign is currently unfolding worldwide," said Romanian cybersecurity company Bitdefender. It said the malicious program appeared to be nearly identical to GoldenEye, one of a family of rogue programs that has been circulating for months. It's not clear whether or why the ransomware had suddenly become so much more potent.

In Switzerland, a government cybersecurity agency said the attacks appeared to employ ransomware known as "Petya."

"There have been indications of late that Petya is in circulation again, exploiting the SMB (Server Message Block) vulnerability," the Swiss Reporting and Analysis Center for Information Assurance (MELANI) told the Reuters news agency in an e-mail.

Reuters said the Petya virus was behind a widespread attack in 2016.

CNET reports the malware encrypts crucial computer files and holds them hostage, demanding $300 in bitcoin to regain access.

Screenshot of a computer affected by the Petya ransomware cyberattack.

Ukraine Prime Minister's Office via CNET

What can computer users do to protect themselves? ZDNet security editor Zack Whittaker said it's important to keep software up to date by installing the latest security patches, but even that may not be enough.

"There's some conflicting reports that even backed-up computers may be affected," he said. "We'll see what happens in the next few hours as we have more information."

In addition to software updates, he advised, "You should carry out regular backups of your data to make sure it's safe and secure, and make sure that backed-up data is never connected to the internet."

Many systems are still recovering from the WannaCry outbreak this spring, which spread rapidly using digital break-in tools originally created by the U.S. National Security Agency (NSA) that wereleaked to the web by a group calling itself the Shadow Brokers.

Max Everett, a cybersecurity expert and managing director at Fortalice Solutions, told CBSN on Monday that the world was simply not prepared for the more widespread attacks expected in the future.

See the article here:
Cyberattack hits Ukraine, Europe, U.S.; hackers use suspected ...