Since at least 1986, Russians – and others acting on Russia's behalf – have been finding their ways into U.S. government, military and civilian computer systems. Click through the timeline to explore what they've done over the years.
Conducting advanced attacks
In more recent years, Russia has been behind some of the most sophisticated cyberattacks on record. The 2015 cyberattack on three of Ukraine’s regional power distribution companies knocked out power to almost a quarter-million people.
Cybersecurity analysts from the Electricity Information Sharing and Analysis Center and the SANS Institute reported that the multi-staged attacks were conducted by a “highly structured and resourced actor.” Ukraine blamed the attacks on Russia.
The attackers used a variety of techniques and adapted to the targets they faced. They used spearphishing email messages to gain initial access to systems. They installed “BlackEnergy” malware to establish remote control over the infected devices. They harvested credentials to move through the networks. They developed custom malicious firmware to render system control devices inoperable.
They hijacked the Supervisory Control and Data Acquisition system to open circuit breakers in substations. They used “KillDisk” malware to erase the master boot record of affected systems. The attackers even went so far as to strike the control stations’ battery backups and tie up the energy company’s call center with thousands of calls.
The Russians returned in 2016 with more advanced tools to take down a major artery of Ukraine’s power grid. Russia is believed to have also invaded energy companies in the US, including those operating nuclear power plants. Top-notch cybereducation
Russia has many skilled cyberoperators, and for good reason: Their educational system emphasises information technology and computer science, more so than in the US. Every year, Russian schools take a disproportionate number of the top spots in the International Collegiate Programming Contest.
In the 2016 contest, St. Petersburg State University took the top spot for the fifth time in a row, and four other Russian schools also made the top 12. In 2017, St. Petersburg ITMO University won, with two other Russian schools also placing in the top 12. The top US school ranked 13th.
As Russia prepared to form a cyberbranch within its military, Minister of Defense Sergei Shoigu took note of Russian students’ performance in the contest. “We have to work with these guys somehow, because we need them badly,” he said in a public meeting with university administrators. Who are these Russian cyberwarriors? See related How Russian hackers went after the world’s coronavirus vaccine secrets Beijing-linked hackers ‘tried to steal’ coronavirus vaccine data State-sponsored hackers ‘trying to steal’ coronavirus vaccine research
Russia employs cyberwarriors within its military and intelligence services. Indeed, the cyberespionage groups dubbed APT28 (aka Fancy Bear) and APT29 (aka Cozy Bear and The Dukes) are believed to correspond to Russia’s military intelligence agency GRU and its state security organisation FSB, respectively.
Both groups have been implicated in hundreds of cyberoperations over the past decade, including US election hacking.
Russia recruits cyberwarriors from its colleges, but also from the cybersecurity and cybercrime sectors. It is said to turn a blind eye to its criminal hackers as long as they avoid Russian targets and use their skills to aid the government.
According to Dmitri Alperovitch, co-founder of the security firm CrowdStrike, when Moscow identifies a talented cybercriminal, any pending criminal case against the person is dropped and the hacker disappears into the Russian intelligence
Although Russia poses a major cyberthreat, it is not the only country that threatens the US in cyberspace. China, Iran and North Korea are also countries with strong cyberattack capabilities, and more countries will join the pool as they develop their people’s skills.
The good news is that actions to protect an organisation’s cybersecurity (such as monitoring access to sensitive files) that work against Russia also work against other threat actors.
The bad news is that many organisations do not take those steps. Further, hackers find new vulnerabilities in devices and exploit the weakest link of all – humans. Whether cyberdefenses will evolve to avert a major calamity, from Russia or anywhere else, remains to be seen
Well that was all very vague tomcatty....A lot of "we believe" accusations there but no actual evidence to back it all up...make no mistake...if there was any proof at all it would be all over the place, but there isn't so the best they can come up with is stream of vague smoke and mirrors accusations pointing the finger at Russia....and of course the majority of people won't know enough about it either..so they cant tell fact from fiction....
blathin: Well that was all very vague tomcatty....A lot of "we believe" accusations there but no actual evidence to back it all up...make no mistake...if there was any proof at all it would be all over the place, but there isn't so the best they can come up with is stream of vague smoke and mirrors accusations pointing the finger at Russia....and of course the majority of people won't know enough about it either..so they cant tell fact from fiction....
Well thanks for putting our inteligence services right, it took me ages to put that lot together surely a little research from yourself would be welcome. Thanks for your comments
tomcatty: Well thanks for putting our inteligence services right, it took me ages to put that lot together surely a little research from yourself would be welcome. Thanks for your comments
Ah of course Tomcatty, that's goes without saying :)
If you can source and put up the evidence being used then maybe we've something to get our teeth into..Technical evidence I mean..not more vague smoke and mirrors of "we believe" etc etc...
blathin: Ah of course Tomcatty, that's goes without saying :)
If you can source and put up the evidence being used then maybe we've something to get our teeth into..Technical evidence I mean..not more vague smoke and mirrors of "we believe" etc etc...
For example..this is a very intruiging claim
"They developed custom malicious firmware to render system control devices inoperable."
Firmware? Now that's very vague? What kind, where when and how?
What system control devices? That could be anything too from a door knob to an AC system to PLC controls ...
blathin: Ah of course Tomcatty, that's goes without saying :)
If you can source and put up the evidence being used then maybe we've something to get our teeth into..Technical evidence I mean..not more vague smoke and mirrors of "we believe" etc etc...
Here is one scource you can research if you want,
Dorothy Denning, emeritus distinguished professor of Defense Analysis at the Naval Postgraduate School, California.
tomcatty: If you can't understand the technical terminology involved that's not my fault
Ok..if you're going to go down that stupid route then I won't waste any more of my time....
I don't know where you got the content of your OP but there enough holes and vague claims in it that one really has to question who they think they're fooling...
blathin: Ok..if you're going to go down that stupid route then I won't waste any more of my time....
I don't know where you got the content of your OP but there enough holes and vague claims in it that one really has to question who they think they're fooling...
tomcatty: Doesanyone now want the Chiese to oversee our 5g operation
China isn't the problem, that's just politics.Anyone who understand how mobile phone technology and RF works will (or should) know just how dangerous 5G is going to be...And what's worse..how far above the permissible levels we have gone( for RF) since the pre mobile phone days.
When it was just radio and tv...the generation who were around when radio became popular were right to be wary and not want their family to have them in their bedroom or near their bed......but radio although not as safe as most people might think....it's nothing compared to where we are today with 4g and soon to be 5G....the ever increasing levels of rf are what people should really be concerned about... ...and the fact that now almost every 12/13/14/15 year old boy in the western world is now going around with RF being transmitted/received , in and out of their pockets, non stop, all day every day.....right beside their groin....
blathin: China isn't the problem, that's just politics.Anyone who understand how mobile phone technology and RF works will (or should) know just how dangerous 5G is going to be...And what's worse..how far above the permissible levels we have gone( for RF) since the pre mobile phone days.
When it was just radio and tv...the generation who were around when radio became popular were right to be wary and not want their family to have them in their bedroom or near their bed......but radio although not as safe as most people might think....it's nothing compared to where we are today with 4g and soon to be 5G....the ever increasing levels of rf are what people should really be concerned about... ...and the fact that now almost every 12/13/14/15 year old boy in the western world is now going around with RF being transmitted/received , in and out of their pockets, non stop, all day every day.....right beside their groin....
they say a littlr knowledge is a dangarous thing.
where are YOUR references to the claims you make in your post. the main problem with having china rollout our 5g is we leave ourselves vulnerable to spy sysrems being rolled out too.
tomcatty: they say a littlr knowledge is a dangarous thing.
where are YOUR references to the claims you make in your post. the main problem with having china rollout our 5g is we leave ourselves vulnerable to spy sysrems being rolled out too.
You don't need a reference ...just familarise yourself with RF, how it works and why it's dangerous. and look up the permissible levels for RF from the early 90's to today and see how vastly different it is today...
blathin: That's not proof that russian hackers attacked a power substation in the Ukraine..that's history Tomcatty...
What? A fella stealing ten million from a bank in the 90's ..seriously? the 90's?? others defaced a website??? crikey lol......if that's your proof that Russia is hacking other countries then you need to go back to the drawing board tom lol...
Put your intelligent head on and read all my posts carefully. RF radiation is not mentioned at 5g frequencies, or did'nt you know they radiate at different frquencies to 4g
You misunderstood the thread completely and because you didnt undestand it you came to the concluion it is wrong.
blathin: Ok, I was genuinely interested but that's the 2nd snide comment from you so clearly you don't take this as seriously as you are trying to imply...
tomcatty: . RF radiation is not mentioned at 5g frequencies, or did'nt you know they radiate at different frquencies to 4g
You misunderstood the thread completely and because you didnt undestand it you came to the concluion it is wrong.
tom... all mobile signals are sent/recieved via RF....so I don't know what you're trying to say there...unless you think RF is just one single freq, which it's not..RF is a fairly wide spectrum of frequencies.
And this is the third time you've been rude to me..... so you can go and work it out for yourself.
Report threads that break rules, are offensive, or contain fighting. Staff may not be aware of the forum abuse, and cannot do anything about it unless you tell us about it. click to report forum abuse »
If one of the comments is offensive, please report the comment instead (there is a link in each comment to report it).
Since at least 1986, Russians – and others acting on Russia's behalf – have been finding their ways into U.S. government, military and civilian computer systems. Click through the timeline to explore what they've done over the years.
Conducting advanced attacks
In more recent years, Russia has been behind some of the most sophisticated cyberattacks on record. The 2015 cyberattack on three of Ukraine’s regional power distribution companies knocked out power to almost a quarter-million people.
Cybersecurity analysts from the Electricity Information Sharing and Analysis Center and the SANS Institute reported that the multi-staged attacks were conducted by a “highly structured and resourced actor.” Ukraine blamed the attacks on Russia.
The attackers used a variety of techniques and adapted to the targets they faced. They used spearphishing email messages to gain initial access to systems. They installed “BlackEnergy” malware to establish remote control over the infected devices. They harvested credentials to move through the networks. They developed custom malicious firmware to render system control devices inoperable.
They hijacked the Supervisory Control and Data Acquisition system to open circuit breakers in substations. They used “KillDisk” malware to erase the master boot record of affected systems. The attackers even went so far as to strike the control stations’ battery backups and tie up the energy company’s call center with thousands of calls.
The Russians returned in 2016 with more advanced tools to take down a major artery of Ukraine’s power grid. Russia is believed to have also invaded energy companies in the US, including those operating nuclear power plants.
Top-notch cybereducation
Russia has many skilled cyberoperators, and for good reason: Their educational system emphasises information technology and computer science, more so than in the US. Every year, Russian schools take a disproportionate number of the top spots in the International Collegiate Programming Contest.
In the 2016 contest, St. Petersburg State University took the top spot for the fifth time in a row, and four other Russian schools also made the top 12. In 2017, St. Petersburg ITMO University won, with two other Russian schools also placing in the top 12. The top US school ranked 13th.
As Russia prepared to form a cyberbranch within its military, Minister of Defense Sergei Shoigu took note of Russian students’ performance in the contest. “We have to work with these guys somehow, because we need them badly,” he said in a public meeting with university administrators.
Who are these Russian cyberwarriors?
See related
How Russian hackers went after the world’s coronavirus vaccine secrets
Beijing-linked hackers ‘tried to steal’ coronavirus vaccine data
State-sponsored hackers ‘trying to steal’ coronavirus vaccine research
Russia employs cyberwarriors within its military and intelligence services. Indeed, the cyberespionage groups dubbed APT28 (aka Fancy Bear) and APT29 (aka Cozy Bear and The Dukes) are believed to correspond to Russia’s military intelligence agency GRU and its state security organisation FSB, respectively.
Both groups have been implicated in hundreds of cyberoperations over the past decade, including US election hacking.
Russia recruits cyberwarriors from its colleges, but also from the cybersecurity and cybercrime sectors. It is said to turn a blind eye to its criminal hackers as long as they avoid Russian targets and use their skills to aid the government.
According to Dmitri Alperovitch, co-founder of the security firm CrowdStrike, when Moscow identifies a talented cybercriminal, any pending criminal case against the person is dropped and the hacker disappears into the Russian intelligence