Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

Serhii Demediuk (pictured) said in an interview with The Associated Press that Russian-controlled digital saboteurs are stepping up attacks on the Central Elections Commission and its employees, trying to penetrate electronic systems in order to manipulate information about the March 31 election.

“On the eve of the election and during the counting of votes there will be cyberattacks on certain objects of critical infrastructure. This applies to the work of the polling stations themselves, districts, and the CEC,” he said.

“From what we are seeing, it will be manipulation aimed at distorting information about the results of elections, and calling the elections null or void,” Demediuk said.

The presidential election will be a test of Ukraine’s capacity for order. Russia has consistently portrayed Ukraine under President Petro Poroshenko as corrupt and poorly run, and undermining the election’s credibility could serve Russia’s propaganda interests.

Ukraine aspires to join the European Union and NATO, and an orderly and credible election could show that it is approaching the democratic standards that those organisations consider key.

Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity.

Since 2014, its energy, transportation and banking systems have been attacked. The malicious program NotPetya hit thousands of computers not only in Ukraine, which was the main target of the attack, but throughout the world.

Asked about Demediuk’s claims, Kremlin spokesman Dmitry Peskov said Wednesday 13th February: “We know nothing about this. The only thing I can say is that we’ve been hearing similar statements from different countries in the world. This is becoming a sort of mania or phobia but it has nothing to do with reality. Russia has never had anything to do with any types of cybercrimes.”

None of the 44 registered candidates appear to have enough support to win an absolute majority, which would force a runoff three weeks later.

The activity of hackers has noticeably increased during the election campaign six weeks before the elections, Demediuk said. He said some of the hackers are impersonating top officials in order to penetrate the computers of commission members and technical staff.

“Every day cyber incidents that come from Russia or from other countries are increasing. Why from other countries? Because our opponents and enemies are not stupid, they use different methods to anonymize and distort information,” he said.

Kiev says the hackers are combining usual digital espionage methods with attempts to manipulate or intimidate.

“We see a combination of classic cyberattacks, such as those previously committed, with misinformation and social engineering,” Demediuk said.

In 2015 Ukraine was the site of the world’s first confirmed attack on a power system. The hackers succeeded in paralysing 30 electrical substations and leaving around 230,000 people without power.

Demediuk said malicious Russian software was often tested in Ukraine, then later used in other countries.

“Ukraine is the launching pad where it all begins ... they first of all test us. We are the enemy for them, and they are for us. And so the use of any cyber weapon is a priority. And if it works with us, they then upgrade it to the requirements and infrastructure and use it in this or that country,” said Demediuk.

He said Ukraine continues to monitor the activities of the group nicknamed APT28 or Fancy Bear, which the US Department of Justice and a host of independent reports have tied to Russia’s military intelligence agency, often called the GRU.

“We follow them, we have indicators with which we can identify and see them. They constantly carry out their activities here,” he said.

APNews

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« IoT Is In The Dark When It Comes To ePrivacy
Dating Sites Fraudster Alert »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.