Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Russian Hackers Utilized Malware for Tracing Artillery Groups of Ukraine

A hackers' syndicate associated with Russia government as well as prominent cyber assaults vis-à-vis the Democratic Party at the time of last presidential election in USA possibly utilized malware to plant it onto Android phones for tracing and striking the artillery of Ukraine between late-2014 and 2016, thus reported express.co.uk dated December 22, 2016.

According to CrowdStrike, attackers hid the malware belonging to the Fancy Bear family inside legitimate software that an officer of the Ukrainian artillery had deployed while Ukrainian forces utilized it. The malware was proliferated via different Internet-based military forums. It was decided that the software would assist the artillery in its operations; however, contained malicious program known as X-Agent which was capable of accessing contacts, crude location data and phone communication from contaminated smart-phones even as about 9,000 artillery officers utilized the particular software.

Mr. Alperovitch contended that the attack couldn't be from ordinary criminals, for there had to be miscreants closely communicating with the army of Russia.

The kind of malware would reflect one fresh instance of the faded demarcation from army battle to cyber war. As known, Russia's war with Ukraine regarding territorial occupation within Crimea and eastern Ukraine has currently heated up, with Ukraine blaming Russia that it prevented inter-government communications during 2014, while PC hacks, which during 2015 disrupted power grids of Ukraine, too were the work of Russia, says iSight a security company.

Fancy Bear's utilization makes Russia capable of taking its cyber expertise onto the battlefield's fringes thus possibly enabling pre-disposed knowledge of troop movements of Ukrainian military that helped Russia to have precious information to make strategic plans, the report states.

The legitimate software could be downloaded from Russia's social media site 'vKontakte' while it was canvassed on those pages of the site which Ukrainian military used. There wasn't any clue that the software could be obtained from Android's applications store thus restricting it from getting distributed beyond the site, CrowdStrike said.

The installed malware utilized via the legitimate software seems as the foremost noticed instance of Fancy Bear malicious software being utilized on Android devices, the report suggests.

» SPAMfighter News - 12/28/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page