Russia Attacked By ‘Full Scale Cyber War’

A wave of fake bomb threats across Russia has entered its second week in what a senior lawmaker called a "full-scale cyberwar" against the country that authorities are ill-equipped to fight. 

About 400,000 people have been evacuated from more than 1,000 shopping malls, airports, and government and other buildings around the country since the surge in hoaxes began around the 10th September, according to the official Tass news agency. 

RIA Novosti said more than 100,000 people were affected on Monday 18th alone. The calls are coming from outside Russia using the Internet, making them difficult to trace, officials said.
"It's a full-scale cyberwar using telephone terrorism," said Frants Klintsevich, deputy head of the Defense Committee in the upper house of parliament, said in a telephone interview. "We will respond."

Among the latest targets was a Stalin-era bomb shelter near Moscow's Garden Ring road, now a Cold War museum, along with several shopping malls and government offices, according to the state-run Tass news service. 

The headquarters of Internet company Yandex NV was targeted just hours after a visit by President Vladimir Putin, according to an unnamed security source cited by the official Tass news agency. The company later said a fire alarm had been triggered.
Altogether Thursday 21st September, more than 15,000 people in eight cities were evacuated because of hoaxes, RIA reported, citing an unnamed security official.
"No other country in the world has experienced something like this. It's an extraordinarily dangerous situation," said Nikolai Kovalyov, a member of the lower house of parliament and former head of the Federal Security Service (FSB), the main successor to the Soviet KGB. "It all started as a hacking attack via Internet-telephony and now ordinary crazies have joined the wave."

The FSB told other security agencies last week not to comment publicly on the hoaxes in order to reduce the risk of panic, the Vedomosti newspaper reported. There was no answer at the FSB press office in Moscow. But Vladimir Puchkov, minister of Emergency Situations, said Wednesday the continuing threats were "a major problem," RIA reported. He rejected speculation they were part of a drill organised by authorities.

So far, all of the hundreds of threats have turned out to be fake. Losses from the evacuations have reached at least 300 million rubles ($5.2 million) in the past week, according to the RBC newspaper.

No one has publicly claimed responsibility for the hoaxes. Officials have given conflicting accounts of who they suspect is behind them, ranging from Islamic State to security services in Ukraine, which has accused Russia of mounting cyber-attacks on its power grid and other systems. 

Ukrainian military spokesperson Andriy Lysenko denied his country played any role, saying the Kremlin was seeking to turn Russia's population against its neighbour.
"This has been an attack unprecedented by its size and unique for Russia," said Sergey Nikitin, an expert in Moscow-based cybersecurity firm Group-IB. 

Hackers may use a chain of servers located in different jurisdictions, that may have conflicts with each other and don't exchange information, to make a call, according to Nikitin. This, in addition to possible use of voice-modulation software and Google translate, make them impossible to trace, he said.

Hamilton News:

You Might Also Read:

Global Cyber Conflict Is Close:

Which Countries Are Ready For Cyberwar?:

How A Cyber Attack Transformed Estonia:
 

 

« What Is Edge Computing?
Deloitte Hit by Cyber Attack: Clients' Private Data Exposed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.