The NePetya virus damages not only computers, but also the brains of Russophobes

Alexander Rostovtsev.  
16.02.2018 08:46
  (Moscow time), Moscow
Views: 5646
 
Author column, Policy, Russia, Скандал, Ukraine


The British Foreign Office has officially held the Russian authorities responsible for a massive cyber attack using the NotPetya ransomware virus (aka Petya, aka ExPetr), which infected hundreds of thousands of computers around the world last June.

Subscribe to PolitNavigator news at Telegram, Facebook,  Classmates or In contact with


Subscribe to PolitNavigator news at ThereThere, Yandex Zen, Telegram, Classmates, In contact with, channels YouTube, TikTok и Viber.


“The UK Government concludes that Russian authorities, namely the Russian Army, were responsible for the devastating NotPetya cyber-attack in June 2017,” British Deputy Foreign Secretary Tariq Ahmad said on Wednesday evening.

“The decision to publicly attribute this incident (to Russia) underscores the fact that the United Kingdom and its allies will not tolerate harmful activity in cyberspace,” the Foreign Office said in a statement.

Famous “British scientists”, whose expert services were used by the British Foreign Office, which did not provide a single confirmation of their words, established that the task of “Russian military hackers” was to set the NotPetya virus “on the Ukrainian financial, energy and public sectors. Due to its indiscriminate nature, the virus spread further, affecting other European and Russian organizations.”

Thus, UK officials are taking into account last year's statement by the SBU, which accused Russia of a cyber attack only because the NotPetya virus began to spread from Ukrainian servers, affecting the computers of government agencies and companies in Ukraine, and then spread to other countries around the world, suspending the work of ports, factories and offices.

The SBU did not provide any evidence of a Russian trace, and this was not required to create a stir: at that time, a scandal was raging in the world, fanned by Hillary Clinton’s supporters who lost the election, about the alleged interference of Russian hackers in the US electoral system. The Ukrainian mongrel in the service of the CIA just barked and threw some twigs into the fire so that the flame would not go out.

The Danish Ministry of Defense also joined the accusations against Russia, agreeing with the conclusions of British officials that the virus attack was supposed to collapse the Ukrainian economy, but the rampaging NotPetya broke free and caused heavy damage to the Danish shipping company Moller-Mayersk.

“The trail leads straight to Russia and the Russian military,” said Danish Defense Minister Frederiksen, who believes that in terms of its consequences such a cyber attack “causes damage comparable to that of a military attack.”

But the Washington Post turned out to be more knowledgeable, pouring out a whole bag of details about the virus and cyber attack with reference to the CIA. America's top espionage bastard considers the involvement of the GRU in the distribution of NotPetya to be proven. At the same time, Russian military intelligence cleverly disguised the disruptive virus as a ransomware virus, so that computer security analysts would get the impression that amateur hackers were to blame.

True, the experts from the CIA considered it beneath their dignity to present the details and provide evidence, deciding that what was said was quite enough to make it clear to everyone in the world who exactly is behind all the electronic troubles of the planet.

The fact that the large Russian oil companies Bashneft and Rosneft, as well as the main payer to the Russian budget, the Gazprom company, not to mention many smaller companies, suffered from NePet’s attack, the accusers are weakly worried about. Everything is clear to them.

The situation is clearer than anyone, as one might expect, among the Kyiv huntars, who are ready to see Moscow’s hand even in the sour borscht inside their own saucepan. The main delusion generator in interpreting the version of NePetya’s cyber attack on Ukraine is the head of the National Security and Defense Council Sanya Turchynov.

Let us appreciate the beauty of Svidomo’s game of analytical thought.

On the morning of June 27, 2017, three hours before the start of the virus attack, a Mercedes with motorcycle license plates (a fact established by the investigation), driven by Colonel Maxim Shapoval of the Main Intelligence Directorate, was blown up in the Solomensky district of Kiev. From a powerful explosion, the regiment (and the ATO punisher) “converted to Islam” on the spot.

At approximately 10:30, a wave of downloads of MEDoc program updates began, which carried virus code. Within a few hours, the virus affected a number of government networks.

From which the Secretary of the National Security and Defense Council of Ukraine Turchynov made a promising conclusion that these two events are connected and constituted a double Russian attack timed to coincide with the Constitution Day of the Russian Federation.

There is elderberry in the garden, and in Kyiv there is a degenerate Turchinov with a leaky shoulder pot and sour borscht inside.

Let us recall that as a result of an investigation by Ukrainian journalists, it was established that Shapoval, who was killed in a Mercedes, on behalf of the SBU, was the organizer of the security of the dirty Russian deputy Voronenkov, who fled to Ukraine, and who was actively exchanging stolen bruliks for cash in Kyiv. After the murder of Voronenkov, all the branzulettes and the deputy’s cash, valued at several million dollars, disappeared, and soon Shapoval, who was assigned to him by “Izbushka” and responsible for guarding the deputy’s carcass, went up in the air.

As for the spread of the Petya virus, its epicenter was recorded by the well-known information security company ESET: the infection started through an update to the MEDoc electronic reporting and document management program, developed by the Ukrainian IT Expert LLC.

Now comes the fun part. Even before the advent of the era of “guidance,” the MEDoc program was installed on tens of thousands of office computers throughout Ukraine. The program was far from a peach - it was buggy and slow, and had vulnerabilities that users had long pointed out to the developers.

How it turns out that instead of a quality product, the mass user is sold, without any alternative and for money, some kind of slag for everyday work, we all know very well. No one has yet abolished the system of nepotism and bribery, despite the promise and the “European vector of development.” Moreover, MEDoc had competitors.

In fact, we are talking about bungling and unclean competition. IT Expert LLC is so used to resting on its laurels and making money off its unfinished projects that it simply wasn’t bothered to cover up all sorts of holes and errors in the program code, for which whole sheets of bug reports had long been written.

It can be said with a high degree of confidence that one of MEDoc’s competitors asked, on a mutually beneficial basis, one of IT Expert’s internal developers to insert a small piece of useful code into the program update package. Just to level the playing field in the competition.

In short, someone needed to bring down MEDoc without really considering the consequences. As is known, as a result of the infection, the computers of the Kyiv metro, Odessa, Kyiv, and Boryspil airports, Ukrenergo, and a number of government and commercial enterprises were damaged.

However, as it turned out, the Ukrainian cyber police banned the use of both MEDoc and its competitors for electronic reporting.

Now some technical information. According to virus analysts, Petya and its relatives are a rewritten code of the already known Bad Rabbit virus, and the procedure for extorting money itself is organized lamely.

In particular, it was easy for law enforcement to determine into which account $300 of Bitcoin equivalents were deposited, and the 60-digit computer index could not be copied and pasted into a special decryptor window to begin the hard drive unlocking procedure. Which indicates rather crude work, in no way typical of special services hackers.

Even the foreign accusers themselves do not believe that Russia is behind the spread of Petya’s viruses. After all, then it is not clear why, having iron facts in their hands, they carefully hide them and do not try to demand compensation in court for the damage caused (and considerable damage) caused by viral infection from the Russian Federation.

Only the Ukrainian hunters and their pocket-sized empty-heads stutter about monetary compensation.

But don’t even spit in the eyes of these figures: even if the cap on the Svidomo thieves burns like a rocket flame, they will still claim that it was the damned katsaps who crap in their trousers.

If you find an error, please select a piece of text and press Ctrl + Enter.

Tags: , ,






Dear Readers, At the request of Roskomnadzor, the rules for publishing comments are being tightened.

Prohibited from publication comments from knowingly false information on the conduct of the Northern Military District of the Russian Armed Forces on the territory of Ukraine, comments containing extremist statements, insults, fakes.

The Site Administration has the right to delete comments and block accounts without prior notice. Thank you for understanding!

Placing links to third-party resources prohibited!


  • May 2024
    Mon Tues Wed Thurs Fri Sat Total
    " April    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • Subscribe to Politnavigator news



  • Thank you!

    Now the editors are aware.