“The British Center for Cybersecurity and Partners from 10 countries revealed the details of how the military unit 26165 of Russia since 2022 conducted a malicious cybercamps”, – WRITE: www.radiosvoboda.org
In the new report, the National Cyber Security Center of the United Kingdom, which is part of the Royal Military-Civil Committee (GCHQ), and partners from ten countries revealed the details of how the military unit 26165 of Russia has conducted a malicious cyber-campaign against state and private organizations since 2022.
According to the Center, these attacks were directed against organizations involved in coordination, transportation and support to Ukraine, as well as in the organization in the defense sector, IT services, sea sector, airports, ports and air traffic management systems in many NATO member countries.
“Section 26165, also known as APT 28, was able to obtain initial access to victims, using a combination of previously disclosed methods, including the selection of credentials, phishing and the former operation of permits to Microsoft Exchange mailboxes. They also attacked cameras connected to the Internet at Ukrainian border crossings and near military facilities for monitoring and tracking humanitarian aid cargoes for Ukraine, ”the message reads.
London supports Ukraine, which continues to resist Russia’s aggression. In total, the United Kingdom has allocated £ 13 billion (about $ 17 billion) for military assistance, and this week, 100 new sanctions against “organizations that support the Russian military machine, energy exports and information war, as well as financial institutions contributing to Ukraine” have been announced this week. It happened after Russia had the largest attack during the war with drone.