UJ.com

Top 2 

                        MONDAY, SEPTEMBER 30, 2024
Make Homepage /  Add Bookmark
Front Page
Nation
Business
Search
Subscription
Advertising
About us
Copyright
Contact
 

   Username:
   Password:


Registration

 
GISMETEO.RU
UJ Week
Top 1   

    
Nation    

DNC hackers used malware on Ukraine army
Journal Staff Report

KIEV, Dec. 22 - The same Russian intelligence hackers who tried to influence the U.S. presidential election used computer malware to target and destroy Ukrainian artillery forces, a top cybersecurity firm said Thursday.

The hackers, known by the name of “Fancy Bear,” used the malware to penetrate the Android cell phone of a Ukrainian military officer to obtain location data and other intelligence.

The report by CrowdStrike, the firm that was hired to investigate the DNC hack in the U.S., further strengthens the case that these same Fancy Bear hackers are closely tied to the Russian military.

“The same hackers that have stolen files from the DNC are engaged in the identification and targeting of Ukrainian forces in eastern Ukraine,” Dmitri Alperovitch, chief technology officer and co-founder of CrowdStrike, said in an interview with Yahoo News. “This establishes a connection between Fancy Bear and the Russian military at an operational level.”

The deployment of Fancy Bear hacking tools in the Ukrainian conflict is, in one sense, not a surprise. Ever since it first published its report linking the DNC hack to Fancy Bear, the firm has contended the perpetrators were closely associated with the GRU, the name of Russia’s military intelligence service.

But the new report being published Thursday would appear to make the linkages even stronger, suggesting that Fancy Bear hackers even used the identical malware to penetrate both the DNC and the Ukrainian military.

According to its new report, the malware was likely initially designed in order to target a mobile app that had been developed by a Ukrainian military officer, part of that country’s 55th Artillery Brigade, to enable his country’s artillery forces to more rapidly fire D-30 Howitzers against Russian separatist forces, backed by the Russian military, in eastern Ukraine.

The military officer, a Russian language speaker, in April 2013 surprisingly promoted the app as “modern combat software” on a Russian language social media site.

This apparently drew the attention of the Fancy Bear hackers who regularly monitor such sites, according to the CrowdStrike report. The hackers then developed a malware dubbed “X-agent” to infiltrate the officer’s Android app sometime in late 2014.

The report says Russian troops then used the X-agent malware to pinpoint the location of Ukrainian Howitzers and destroy them. This resulted in potentially hundreds of Ukrainian casualties, according to Alperovitch.

Relying in part on open source media reports and eyewitness accounts, the report notes that the Russians used drones to develop more precise location data for Ukrainian positions, “introducing the possibility that the Android malware served to support the reconnaissance role of traditional battlefield assets.”

But what may be most significant, according to Alperovitch, is that the same X-agent malware was later used by Fancy Bear to attack the DNC.

“We have ONLY seen Fancy Bear use it and no other group ever,” he wrote in an email to Yahoo News. “Its source code is also not publicly available and has never been seen on any underground forums.” (yn/ez)




Log in

Print article E-mail article


Currencies (in hryvnias)
  27.09.2024 prev
USD 41.21 41.26
RUR 0.444 0.446
EUR 45.96 46.20

Stock Market
  26.09.2024 prev
PFTS 507.0 507.0
source: PFTS

OTHER NEWS

Ukrainian Journal   
Front PageNationBusinessEditorialFeatureAdvertisingSubscriptionAdvertisingSearchAbout usCopyrightContact
Copyright 2005 Ukrainian Journal. All rights reserved
Programmed by TAC webstudio