Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

Serhii Demediuk (pictured) said in an interview with The Associated Press that Russian-controlled digital saboteurs are stepping up attacks on the Central Elections Commission and its employees, trying to penetrate electronic systems in order to manipulate information about the March 31 election.

“On the eve of the election and during the counting of votes there will be cyberattacks on certain objects of critical infrastructure. This applies to the work of the polling stations themselves, districts, and the CEC,” he said.

“From what we are seeing, it will be manipulation aimed at distorting information about the results of elections, and calling the elections null or void,” Demediuk said.

The presidential election will be a test of Ukraine’s capacity for order. Russia has consistently portrayed Ukraine under President Petro Poroshenko as corrupt and poorly run, and undermining the election’s credibility could serve Russia’s propaganda interests.

Ukraine aspires to join the European Union and NATO, and an orderly and credible election could show that it is approaching the democratic standards that those organisations consider key.

Ukraine has been locked in a years-long struggle with Russia-backed separatists in the country’s east and has repeatedly been hit by cyberattacks of escalating severity.

Since 2014, its energy, transportation and banking systems have been attacked. The malicious program NotPetya hit thousands of computers not only in Ukraine, which was the main target of the attack, but throughout the world.

Asked about Demediuk’s claims, Kremlin spokesman Dmitry Peskov said Wednesday 13th February: “We know nothing about this. The only thing I can say is that we’ve been hearing similar statements from different countries in the world. This is becoming a sort of mania or phobia but it has nothing to do with reality. Russia has never had anything to do with any types of cybercrimes.”

None of the 44 registered candidates appear to have enough support to win an absolute majority, which would force a runoff three weeks later.

The activity of hackers has noticeably increased during the election campaign six weeks before the elections, Demediuk said. He said some of the hackers are impersonating top officials in order to penetrate the computers of commission members and technical staff.

“Every day cyber incidents that come from Russia or from other countries are increasing. Why from other countries? Because our opponents and enemies are not stupid, they use different methods to anonymize and distort information,” he said.

Kiev says the hackers are combining usual digital espionage methods with attempts to manipulate or intimidate.

“We see a combination of classic cyberattacks, such as those previously committed, with misinformation and social engineering,” Demediuk said.

In 2015 Ukraine was the site of the world’s first confirmed attack on a power system. The hackers succeeded in paralysing 30 electrical substations and leaving around 230,000 people without power.

Demediuk said malicious Russian software was often tested in Ukraine, then later used in other countries.

“Ukraine is the launching pad where it all begins ... they first of all test us. We are the enemy for them, and they are for us. And so the use of any cyber weapon is a priority. And if it works with us, they then upgrade it to the requirements and infrastructure and use it in this or that country,” said Demediuk.

He said Ukraine continues to monitor the activities of the group nicknamed APT28 or Fancy Bear, which the US Department of Justice and a host of independent reports have tied to Russia’s military intelligence agency, often called the GRU.

“We follow them, we have indicators with which we can identify and see them. They constantly carry out their activities here,” he said.

APNews

You Might Also Read: 

Cyberwar Vs. Traditional Conflict:

 

« IoT Is In The Dark When It Comes To ePrivacy
Dating Sites Fraudster Alert »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.