BACK

Reckless campaign of cyber attacks by Russian military intelligence service exposed

[vc_row][vc_column][vc_column_text]This week the National Cyber Security Centre (NCSC) released a statement confirming that they had evidence that a large number of ‘hackers’ that have been targeting national infrastructure and businesses around the world are indeed the GRU (Russian military intelligence service).  They said “These attacks have been conducted in flagrant violation of international law, have …

  • 05 Oct 2018
  • Name Surname
1 min read
Reckless campaign of cyber attacks by Russian military intelligence service exposed

[vc_row][vc_column][vc_column_text]This week the National Cyber Security Centre (NCSC) released a statement confirming that they had evidence that a large number of ‘hackers’ that have been targeting national infrastructure and businesses around the world are indeed the GRU (Russian military intelligence service).  They said “These attacks have been conducted in flagrant violation of international law, have affected citizens in a large number of countries, including Russia, and have cost national economies millions of pounds.”

They also released a list of names that are associated with the GRU as can be seen below.

  • APT 28
  • Fancy Bear
  • Sofacy
  • Pawnstorm
  • Sednit
  • CyberCaliphate
  • Cyber Berkut
  • Voodoo Bear
  • BlackEnergy Actors
  • STRONTIUM
  • Tsar Team
  • Sandworm

 

Further to revealing the believed identity of the attackers the NCSC have also “made the judgement that the Russian Government – the Kremlin – was responsible.”  More can be found at – https://www.ncsc.gov.uk/news/reckless-campaign-cyber-attacks-russian-military-intelligence-service-exposed[/vc_column_text][/vc_column][/vc_row]

Blog Details
  • 05 Oct 2018
  • Name Surname

Newest Articles.

View all
  • 04 Mar 16

    Top 5 Recent Cyber-attacks/hacks and How They Could Relate to your Business.

    Read Article logo
  • 13 Mar 16

    Data leaks, how can they affect Sales and Business Integrity?

    Read Article logo
  • 20 Apr 16

    Common Cyber Security Threats Faced by Businesses and The Impacts

    Read Article logo
  • 11 May 16

    Regular Vulnerability Scans Assessments: Keeping You Safe

    Read Article logo

Get a Quote

Click below and we’ll send you a quote as soon as possible.

quote-form-pattern
  • This field is for validation purposes and should be left unchanged.

Contact Us

Click below and we’ll send you a quote as soon as possible.

quote-form-pattern
  • This field is for validation purposes and should be left unchanged.

Step 1 of 4 - Let’s get started

25%
  • Thanks for your interest in working with us. Please complete the details below and we’ll get back to you as soon as possible.

Buy Cyber Essentials

price-popup-pattern