Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Today’s NYT Connections: Sports Edition Hints, Answers for April 20 #574
    • Will Humans Live Forever? AI Races to Defeat Aging
    • AI evolves itself to speed up scientific discovery
    • Australia’s privacy commissioner tried, in vain, to sound the alarm on data protection during the u16s social media ban trials
    • Nothing Phone (4a) Pro Review: A Close Second
    • Match Group CEO Spencer Rascoff says growing women’s share on Tinder is his “primary focus” to stem user declines; Sensor Tower says 75% of Tinder users are men (Kieran Smith/Financial Times)
    • Today’s NYT Connections Hints, Answers for April 20 #1044
    • AI Machine-Vision Earns Man Overboard Certification
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Monday, April 20
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Tech Analysis»UK exposes Russian cyber campaign targeting support for Ukraine
    Tech Analysis

    UK exposes Russian cyber campaign targeting support for Ukraine

    Editor Times FeaturedBy Editor Times FeaturedMay 21, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Imran Rahman-Jones & Chris Vallance

    Expertise reporters

    Getty Images A forklift truck loads aid into a lorryGetty Pictures

    Cameras monitoring provides going into Ukraine have been hacked into

    The UK has uncovered what it says is a “malicious cyber marketing campaign” focusing on a number of organisations, together with these concerned in delivering overseas help to Ukraine

    After a joint investigation with allies together with the US, Germany and France, the UK’s Nationwide Cyber Safety Centre (NCSC) mentioned a Russian army unit had been focusing on each private and non-private organisations since 2022.

    These embody organisations concerned in supplying defence, IT providers and logistics help.

    The safety our bodies of 10 Nato international locations and Australia mentioned Russian spies had used a mix of hacking methods to realize entry to networks.

    A few of the targets have been internet-connected cameras at Ukrainian borders which monitored assist shipments going into the nation.

    The report additionally says a tough estimate of 10,000 cameras have been accessed close to “army installations, and rail stations, to trace the motion of supplies into Ukraine.

    It provides the “actors additionally used professional municipal providers, corresponding to visitors cams.”

    The Russian army unit blamed for the espionage is named GRU Unit 26165 however goes by numerous casual names, together with Fancy Bear.

    The infamous hacking group is understood to have previously leaked World Anti-Doping Company knowledge, and performed a key function in the 2016 cyber-attack on the US’s Democratic Nationwide Committee, based on safety consultants.

    “This malicious marketing campaign by Russia’s army intelligence service presents a severe danger to focused organisations, together with these concerned within the supply of help to Ukraine,” Paul Chichester, NCSC Director of Operations, mentioned in an announcement.

    “We strongly encourage organisations to familiarise themselves with the menace and mitigation recommendation included within the advisory to assist defend their networks,” he added.

    Anybody concerned in shifting items into Ukraine “ought to think about themselves focused” by Russian army intelligence, John Hultquist, chief analyst at Google Risk Intelligence Group, mentioned.

    “Past the curiosity in figuring out help to the battlefield, there may be an curiosity in disrupting that help by means of both bodily or cyber means,” he mentioned.

    “These incidents could possibly be precursors to different severe actions.”

    Internet Archive A screenshot of a basic-looking website with a picture of a bear, with a large sign in front saying "This domain has been seized".Web Archive

    The Fancy Bear web site was shut down by the FBI in 2018

    The joint cyber-security advisory mentioned Fancy Bear had focused organisations linked to crucial infrastructure together with ports, airports, air visitors administration and the defence trade.

    These have been in 12 mainland European international locations and the US.

    The hackers used a mix of methods to realize entry, the report mentioned, together with guessing passwords.

    One other technique used is named spearphishing, the place faux emails are focused at particular individuals who have entry to methods.

    They’re introduced with a faux web page the place they enter their login particulars, or inspired to click on a hyperlink which then installs malicious software program.

    “The topics of spearphishing emails have been numerous and ranged from skilled subjects to grownup themes,” the report mentioned.

    A vulnerability in Microsoft Outlook was additionally exploited to gather credentials “by way of specifically crafted Outlook calendar appointment invites”.

    These sorts of methods have been “a staple tactic of this group for over a decade,” Rafe Pilling, director of menace intelligence at Sophos Counter Risk Unit, mentioned.

    Digicam entry “would help within the understanding of what items have been being transported, when, in what volumes and help kinetic [weapons] focusing on,” he added.

    A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Francis Bacon and the Scientific Method

    April 19, 2026

    Efficient Design and Simulation of LPDA-Fed Parabolic Reflector Antennas

    April 17, 2026

    IEEE Connects Hardware Startups With Investors

    April 16, 2026

    From RSA to Lattices: The Quantum Safe Crypto Shift

    April 15, 2026

    Stealth Satellite TV Defeats Iran’s Internet Blackout

    April 15, 2026

    Tech Life – Sharing the road with driverless cars

    April 14, 2026

    Comments are closed.

    Editors Picks

    Today’s NYT Connections: Sports Edition Hints, Answers for April 20 #574

    April 20, 2026

    Will Humans Live Forever? AI Races to Defeat Aging

    April 20, 2026

    AI evolves itself to speed up scientific discovery

    April 20, 2026

    Australia’s privacy commissioner tried, in vain, to sound the alarm on data protection during the u16s social media ban trials

    April 20, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Artificial Intelligence, Machine Learning, Deep Learning, and Generative AI — Clearly Explained

    December 7, 2025

    How a health app helping women deal with their gut feelings topped the charts

    October 29, 2025

    Financially motivated hackers are helping their espionage counterparts and vice versa

    February 18, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.