Hackers have intensified attacks on objects of the critical information structure of the Russian Federation

Oleg Kravtsov.  
01.12.2020 09:55
  (Moscow time), Moscow
Views: 3189
 
Криминал, Policy, Russia


The number of cybercrimes against Russian companies has doubled compared to last year.

A PolitNavigator correspondent reports this, Kommersant reports.

The number of cybercrimes against Russian companies has doubled compared to last year. About it,...

Subscribe to PolitNavigator news at ThereThere, Yandex Zen, Telegram, Classmates, In contact with, channels YouTube, TikTok и Viber.


Referring to the report of the Center for Monitoring and Responding to Cyberattacks Solar JSOC of Rostelecom-Solar, the publication indicates that in January-November 2020 more than 200 professional hacker attacks on Russian companies were recorded.

This is double the figure for all of 2019. Of these, 30 attacks were carried out by groups of the highest level, working, as Rostelecom suggests, for foreign countries. Most often, professional groups tried to hack critical information infrastructure (CII) facilities, which include, for example, banks, nuclear enterprises, healthcare facilities, electricity supplies, military facilities and government agencies.

It is noteworthy that in 85% of cases, the report notes, hacker groups find so-called zero-day vulnerabilities (that is, unknown to developers) in the software of Russian CII objects, and then try to hack mail servers and computers of top officials of companies and departments.

Attackers also attempted to gain control over the infrastructure of facilities by attacking workstations of IT administrators with a high level of privileges. At the same time, Vladimir Dryukov, director of the center for monitoring and responding to cyber attacks at Solar JSOC Rostelecom-Solar, warns that the high level of security of the company’s IT infrastructure does not guarantee that hackers will not be able to gain access to it.

“Increasingly, attackers do not attack the organization itself directly, but act through its contractor, who cares less about information security and at the same time has access to the infrastructure of the final target of the attack,” says Dryukov.

And the director of the InfoWatch ARMA project management department, Andrey Yurshev, emphasizes that the increase in attacks on industrial systems is a global trend associated with the spread of software for hackers and the interest of states in cyber operations.

“Imported software sends so-called telemetry information to its manufacturers. Therefore, corporate networks, whose employees, even only for official duties, have access to the Internet, have already transmitted abroad all the necessary information to organize an intrusion into them or host sleeping malware,” Yurshev said.

If you find an error, please select a piece of text and press Ctrl + Enter.

Tags: , , ,






Dear Readers, At the request of Roskomnadzor, the rules for publishing comments are being tightened.

Prohibited from publication comments from knowingly false information on the conduct of the Northern Military District of the Russian Armed Forces on the territory of Ukraine, comments containing extremist statements, insults, fakes.

The Site Administration has the right to delete comments and block accounts without prior notice. Thank you for understanding!

Placing links to third-party resources prohibited!


  • April 2024
    Mon Tues Wed Thurs Fri Sat Total
    " March    
    1234567
    891011121314
    15161718192021
    22232425262728
    2930  
  • Subscribe to Politnavigator news



  • Thank you!

    Now the editors are aware.