The Czech Republic again accused Russia of hacker attacks


The representative of the Czech National Cyber and Information Security Agency (NUKIB) during a report to the Senate Defense and Security Committee stated that hacker attack on the network of the Czech Foreign Ministry in June this year was organized by a foreign state.

NUKIB on Tuesday provided the results of the investigation of a DDoS attack, which reported that the Russian GRU attacked the computer network of the Foreign Ministry. “The GRU and their hacker group APT28 / Sofacy are behind this attack.”

"The Czech Foreign Ministry was again attacked by hackers from the Russian GRU. Therefore, I understand that we are conducting an open hybrid war with Russia. This espionage should not go unanswered", — Chairman of the party "Elders and Independents" Vit Rakushan commented on the situation.

Prime Minister Andrei Babish said that the Czech Foreign Ministry should focus on strengthening the security of its computer network.

Czech Foreign Minister Tomas Petricek, in turn, said that he had already appealed to the Ministry of Finance of the Republic for additional funding for his Department. The requested funds will be used to implement measures aimed at strengthening cybersecurity. The Minister intends to inform the government about cyber attacks on the Foreign Ministry.

According to Babish, the topic of cyber attacks on the Foreign Ministry will be one of the topics of discussion at the next meeting of the State Security Council. It will take place after August 26, when the holidays of most members of the Cabinet of Ministers will end.

It was previously reported that a criminal case was opened on the fact of a cyber attack on the Foreign Ministry. Hackers didn't manage to steal secret information. They gained access only to a few e-mail boxes of employees of the Ministry, but could not hack the server through which official correspondence is carried out.

Recall that in 2016, the Czech Foreign Ministry was also subjected to hacker attacks. Then the hackers got access to 150 email addresses of employees of the Ministry. The June attack this year led to failures in the internal computer network of the Ministry of Foreign Affairs

On the guard of the cyber world: Ethical-hackers will appear in the Russian army


The Russian army will have special units, which will include ethical-hackers - people with technical education who will protect the "military Internet". They will scan the system for the presence of enemy cyber attacks and quickly neutralize them.

Conscripts will not be able to get into such units because only officers with special higher technical education can serve in a cyber army.

According to military expert Dmitry Boltenkov, it is necessary to block the attacking computers of the enemy and prevent him from getting into the network. Usually, software and hardware protection is used for this, as well as special devices that protect against hacking or warn of penetration.

It is already known that the software has already been created that should unite the field control stations and provide a multi-level network protection system.

According to experts, such a system will make it impossible for external access to the "military Internet". Protection includes several firewalls that prevent unauthorized access. So, specially designed antiviruses will track the unauthorized access of malware.

The exact place where the invasion occurred and the enemy could intercept radio signals or connect to the network will be detected with the help of special programs and equipment. Further, cybersecurity experts from the new unit can identify and localize the consequences of the attack.

The main advantage of this system is its autonomy because "military Internet" is not connected with the usual network, which means it is less prone to leaks and hacker attacks from outside.

The Ministry of Defense tested the work of the “military Internet” this year. The exchange of information at a speed of 300 Mbit/s was carried out between the field control stations at a distance of more than 2 thousand km. The military Department used special equipment and more than a thousand mobile communication and encryption complexes to create ultra-long data lines. The new system allows the exchange of information at a distance of several thousand kilometers, and all communication channels will be protected from hacking.

In addition, the Armed Forces of Russia are also creating a sovereign Internet - multiservice transport communication network (MTSS). It is planned to complete the first stage of work at the end of this year.

The scammers started to use fake video to steal money of the Russians



Fake videos appeared on the Internet with overlapping faces and voices of famous people with the help of which scammers steal funds. IT company JET warned Russians about this.

"A relatively new phenomenon deep fake has appeared on the network, it is fake videos with overlapping faces and voices of famous people on videos of various contents using Deep Learning technologies. This technology allows you to replace the movement of the lips and human speech on the video. It is difficult for an ordinary user to identify such fakes, and many take them for the truth," the company said.

Experts of the company found in the network fraudulent video using the image of the Russian showman and actor Dmitry Nagiyev, where he offers to visit a certain site and get a prize or cash reward. The company said that site visitors may lose money.

The company JET noted that the victims got to the portal with the generated domain name. Such sites only work for a couple of days, but criminals constantly open new ones.

According to Anna Oleinikova, an expert on neural networks in the company JET, deep fake is an extremely serious threat. "The range of malicious use of deep fake and similar technologies is very wide: blackmail, discrediting of media persons and politicians, unfair competition in business and politics," she said.

At the same time, the company notes that ordinary users can try to identify fakes, based on several signs. So, on fraudulent videos all the time eyes are open or half-closed, and around the head at sharp movements and change of lighting there are strange loops.

In turn, Stanislav Ashmanov, the head of the company "Neural networks of Ashmanov", said that it is very difficult to create believable deep fake. This requires a lot of different data and a complex algorithm. Now everything that appears on the Network suffers from a lack of quality and looks quite improbable.

“In my opinion, technology has not yet been completely improved to make video indistinguishable from reality, cheap and easy,” he added.


Fraudsters started selling customer data of the Russian Bank that fell under the reorganization of the Central Bank


A database of 70,000 Binbank customers leaked to the Internet, which was merged with Open Bank in early 2019. According to experts, this is the fault of the Bank of Russia, which at the stage of the introduction of the interim administration did not bother to check the information security of the credit institution. According to lawyers, clients who suffered as a result of a data leak have a chance to return funds in court.

It is known that for 5 thousand rubles ($77) dealers can get access to the name and surname of the client, find out passport details and place of residence.

Ashot Hovhannisyan, the founder of DeviceLock, said that the sold base consists of clients who at one time applied for an Elixir credit card. According to him, the database was sold to one wholesale buyer, and now several small underground dealers are engaged in trade in personal data.

In addition, according to law enforcement agencies, since the beginning of 2019, about a hundred former clients of Binbank lost their funds and filed a report. The amount of theft from the accounts is from three to one hundred thousand rubles ($ 46 – $1535). It is possible that the data leak affected the actions of Bank fraudsters.

The Federal Service for Supervision of Communications, Information Technology and Mass Communications (Roskomnadzor) sent a written request to Open Bank to clarify the situation. The letter contains a requirement to provide information on the reasons that led to the leak of personal data of bank customers (name, passport details, telephone number and address of clients), about the persons who committed the leak, as well as on the measures taken to eliminate the consequences of the incident.

According to Roskomnadzor, an untimely warning about leaks of personal data threatens the security of personal data of citizens.

Open Bank has denied information about the leak of personal information about Binbank depositors. The Open Bank Press Service stressed that there is no evidence that the leaked database has any relation to the clients of Binbank.


The Russian Quality System recommends covering up the camera and microphone of the laptop - Paranoia or not?


“The Internet is an insecure space, so you should not neglect the rules of digital hygiene”, assure experts of the Center of Digital Expertise of the Russian Quality System (Roskachestvo).

Experts remind that antivirus and updated software must be installed on the computer. They also recommend covering up the camera and microphone while they are not in use. This can be done with tape, duct tape or a special curtain.

"Spyware malware is able to activate a microphone or camera on the device," said Anton Fishman, the Head of the Group-IB system solutions Department. According to him, this is how Pegasus spyware works, which attacked Android and iOS through a vulnerability in older versions of WhatsApp messenger.

According to experts, even if you do not give different applications permission to access the microphone and camera, smartphones still monitor the owners, collect data about them. The reason is clear, first of all, in order to advertise the goods and services a person needs. Experts note that this happens even when access to the camera or microphone is disabled.

“We have to state that, in fact, sticking together a camera and a microphone is no longer paranoia, but one of the rules of digital hygiene,” said Ilya Loyevsky, deputy head of the Russian Quality System.

Moreover, Yevgeny Novikov, the Press Secretary of the Ministry of Digital Development, Communications and Mass Communications supported the recommendations of the Russian Quality System. He noted that Internet scammers often use methods of social engineering rather than technical vulnerabilities. In this regard, users of laptops and smartphones should take care of the protection of personal data, and not rely on antivirus.

“Internet users really should observe cyber hygiene and also take care of the safety of their personal data. You cannot completely rely on antiviruses,” said Novikov.

He noticed that he also is covering up the camera on the laptop.

Hacker Alexander Warskoy commented on the initiative of the Russian Quality System, calling these measures rather ridiculous. He added that if spies want to access devices, they will still get it.

Internet Ombudsman Dmitry Marinichev called paranoia the recommendation of the Russian Quality System. "Sticking a camera on a laptop is paranoia that can lead to Russians starting to cover up the TV with a towel."


More than half of Russians are not ready for e-passports


Previously, Ehacking News reported that the Russian government has determined the basic parameters of the future electronic passport. Documents of the new type will be issued to Russians from 2020 in Moscow, and it is planned to fully switch to digital passports by 2022.

It turned out that more than half of Russians are not ready to issue electronic passports. They believe that this document is not secure; in addition, they fear possible failures in the system and database. The results of a survey of the All-Russian Public Opinion Research Center proof this. A nationwide survey was conducted on July 25, 2019. The survey was attended by Russians aged 18 years.

According to the Russians, one of the key advantages of an electronic passport is its universality, as one document contains all the data. Citizens also noted the durability of this document format, low risks of loss, compactness and its practicality.

According to 22% of Russians, this document in electronic form is not secure. Another 8% of Russians are afraid of possible failures in the system and database. 4% believe that the risks of the new document format are associated with the possible leakage of data to third parties and the loss of the passport.

According to respondents, the most useful functions of an electronic passport can be the ability to use it as a Bank card (payment for services, receiving salaries/pensions/benefits and other charges); the function of storing several documents at the same time (passport, driver's license, employment record, etc.), as well as signing and sending documents to the State institution without visiting it.

“According to Russians, the least useful functions of an e-passport are the opening of an Individual Enterprise / LLC (47%); entering into contracts with organizations in electronic form (52%) and notarization of electronic documents (53%)," - noted in the All-Russian Public Opinion Research Center.

State Duma Deputy Svetlana Bessarab commented on the survey data. In her opinion, everyone who doubts the security of an electronic document should be able to keep a paper one.

Deputy Chairman of the Duma Committee on Information Technology and Communications Andrei Svintsov expressed the opinion that the full digitalization of the economy will allow staying ahead of competitors, to create more comfortable conditions for citizens.


Banks collect biometric data of citizens in Russia






More than 70 Bank offices in the Irkutsk region are already working in the Unified Biometric System, which allows receiving services of bank remotely.


Recall that remote identification was launched in Russia in mid-2018. Clients just need to confirm their identity using biometric data - face images and voice recording.

According to the employer of the Irkutsk Branch of the Bank of Russia, clients need to come to the office once with a passport in order to register in the system. This procedure takes less than 1 minute. Today, 71 Bank offices work with such technologies in the Irkutsk region. Siberian residents can do the identification procedure in the biometric system in 687 branches of 57 banks.

Citizens have access to services of opening an account, obtaining a loan and transferring funds. These services can be obtained by phone, without a personal visit to the office of the Bank. The number of services will expand in the future. In addition, soon insurance companies will also recognize citizens by biometric data.

The new system has significantly reduced the number of Bank frauds. Thus, according to the Pochta Bank, the credit institution managed to block about five thousand fraud attempts in the last year through the biometric identification of clients.

Svetlana Ozeretskovskaya, the Head of Promotion of the Unified Biometric System project, stressed that "all biometric data is encrypted. It is almost impossible to restore them. This reduces the risk of compromise and does not allow attackers to take advantage of the data, even if some kind of leak occurs".

Meanwhile, cybersecurity specialists still see some weaknesses in the system. For example, Trojans in mobile applications or social networks can intercept biometric. But the authors of the biometric identification system are sure that even if your data gets to the criminals, the system will still calculate the fraud. According to the company Rostelecom, the probability of incorrect recognition of the client is 1 per 10 million. Moreover, the system will distinguish even twins from each other.

All data is in plastic: the usual passports of Russians will begin to change into digital


The Russian government has determined the basic parameters of the future electronic passport. Documents of the new type will be issued to Russians from 2020 in Moscow, and it is planned to fully switch to digital passports by 2022.

Paper passports will no longer be issued, but old documents will remain valid until their expiration date. People over 45 will continue to use paper documents indefinitely.

The e-passport will become a universal carrier of information about a person, necessary for his identification. The government is discussing the addition of other personal data to such a document, such as electronic signatures, fingerprints, insurance number.

However, the design of the electronic passport has not yet been approved. Prime Minister Dmitry Medvedev said that the main version is a plastic card with a chip, which will be complemented by the secure mobile application "My passport".

Such a document looks like a Bank card with a high degree of protection NFC-based chip will be integrated into the card and the card will also have a QR code and holographic protection. All components for the new document will be only "made in Russia".
Crypto-protection will increase the protection of a new passport against fakes. In addition, the mobile application "My passport" will give the opportunity to use a cloud digital signature, which is convenient for entrepreneurs. It is planned that the application will be available for all platforms — Android, iOS and even for the Russian operating system Aurora.

The government promised to pay maximum attention to the protection of electronic passports from hacking and manipulation.

It is interesting to note that Georgian citizens can already receive an electronic identity card, they can get it within three days for $ 10. A “smart” chip embedded in a plastic passport allows identifying the owner and getting all the information about his property, tax payments and even health.

"Now more than three million citizens of Georgia have electronic passports. Citizens from 14 years of age must obtain a passport", – said Givi Azarashvili, the Director of the House of Justice.



The Program " The straight line with Vladimir Putin” underwent a DDoS attack.


The straight line call center with Russian President Vladimir Putin was DDoS-attacked from abroad. It is noted that due to this fact there were problems with connection during Putin's communication with the Russians.

The host of the program on the air told, "Our call center just underwent a massive DDoS attack from abroad, apparently, failures in video calls are associated with this. The total number of calls is already approaching two million”.

The press service of Russia's largest provider of digital services Rostelecom said, “Two powerful attacks happened. Rostelecom successfully repelled the attacks. The attacks did not affect the straight line operation."

An interesting fact is that Margarita Simonyan, the editor of the Russian international news channel RT, said that the attack of hackers was carried out from the territory of Ukraine.

Alexey Malnev, the Head of the Monitoring and Response Center at Jet Infosystem, said that in the period from 2013 to 2015, almost every political or economic event was subjected to a powerful surge of attacks.

The expert stressed that the hacker attack on the straight line with Russian President Vladimir Putin was carried out in order to destabilize the situation.

"Today we can say with confidence that this is a wave of the established trend of recent years," said Malnev.

He also added that the cyber war in the modern world is permanent. The expert noted that in the future we should continue to expect similar as well as more complex attacks.

It is worth noting that the Program "The straight line with Vladimir Putin" is already the 17th since 2001 and takes place in the classical format. The President is in the Studio, where he answers questions of interest to Russians, received both by phone and through the direct line website or a special application. If necessary, the Head of State may contact the Heads of regions and Ministers on various issues.

Usually at the end of a straight line Putin draws up a list of instructions, appointing responsible persons and deadlines for the execution of each task.


The cyber security week began in Moscow


For the first time, Sberbank holds Global Cyber Week, an international cybersecurity week, in Moscow; it will be held from 17 to 21 June. The first day of Global Cyber Week began on Monday.

The II International Cybersecurity Congress (ICC) is a key event of Global Cyber Week, which is attended by leading experts from around the world. The event has no analogs in the world.

The II ICC will be held at the World Trade Center in Moscow. Sberbank is organizing a similar congress in Moscow for the second time. The first Congress was held on July 5-6, 2018 and gathered more than 2.2 thousand participants representing about 700 organizations from more than 50 countries. Russian President Vladimir Putin took part in the Congress.

Several important events will open Global Cyber Week. This is an International Cybersecurity Practical Conference OFFZONE, designed primarily for young people, and Cyber Polygon, the world's first online cybersecurity training for major international companies.

The press service said, "The participants of the Conference will learn about the most popular research and modern tools of protection firsthand, as well as take part in various competitions in ethical hacking."

More than one and a half thousand participants came to Global Cyber Week on the first day, whose age does not exceed 25 years. Everything can be hacked at the event, even the badges (a name card of each participant).

President of Sberbank German Gref said that Sberbank has created a platform to unite the world community against cyber threats. He believes that the work on creating a secure global cyberspace is at an early stage, and it is necessary to develop the effective international cooperation at the corporate level to successfully combat cybercrime.

Russian President Vladimir Putin said, "We are well aware that it is possible to neutralize cyber threats only together, combining the efforts of the entire international community."

Stanislav Kuznetsov, Deputy Chairman of the Board of Sberbank, is confident that International Cybersecurity Congress will provide an opportunity to exchange views and tested technologies, and to provide for risks in the future.

Hackers attacked the Russian State exam system for two days


Days of passing State exams are very important for 11th-grade students of Russian schools. Their future life depends on the results of the most important exam in life. It turned out that hackers wanted to influence the results of final exams.

The Federal Education and Science Supervisory Department reported on cyber attacks on information systems of the Unified State Exam (USE). According to the Department, mass DDoS-attacks on servers providing information exchange were recorded. The first attack was recorded on May 31 after the exam on history and chemistry, and then hackers attacked again the next day.

According to Sergey Kravtsov, the Head of The Federal Education and Science Supervisory Department, hackers tried to disable the system of the Department, but the experts managed to maintain the regular work of servers and their accessibility to users.

It is important to note that such attacks are carried out to overload the server and make it unavailable by sending a large number of requests.

It is known that cyber attacks did not lead to problems for organizers and graduates. Hackers chose unsuccessfully the time of the attacks as students already passed the exams. Fortunately, hacker attacks did not affect the processing of the results of the USE.

Law enforcement agencies are already informed about the incident. Now they are looking for persons who organized the attack on the infrastructure of the Ministry of Education of the Russian Federation.

This year exams will continue until July 1. At the moment there is a chance that such attacks will be repeated. The Department reported that it is ready for them and will not allow any failures.

An interesting fact is that last year on the first day of the USE, May 29, hackers attacked the site of online monitoring of the exams. According to Lyubov Dukhanin, the Deputy Chairman of the State Duma Committee on Education and Science, the USE system has sufficient protection to ensure the safety of the exams. She added that it was the first such attack on the site that controls the Unified State Exam.

GLONASS to protect signals of future satellites from hacker attacks


The Transport Safety Forum was held in St. Petersburg last week, in which the Chief Designer of GLONASS JSC Mikhail Korablev took part. He reported that the new Federal Target Program has a task to protect signals of future satellites from hacker attacks.

It is worth noting that GLONASS is a Russian satellite navigation system, one of only two fully functioning global satellite navigation systems in the world for today.

According to Mr Korablev, the task is to improve the accuracy of the GLONASS system and to increase the security of the signal, to combat spoofing (an attack on a satellite in which a navigation signal is faked).

"The attack of the ship management system is a problem. All ships use satellite navigation. There is a confirmed fact of information attacks on ships that do not allow making it possible to determine the location. Therefore, one of the tasks of the new program, in addition to improving accuracy, is to increase security," said Korablev.

It is not yet known how the satellite signal will be protected because the new Federal Target Program for the development of the GLONASS navigation system for the period 2021-2030 has not yet been approved. Currently, it is in the process of negotiation and should soon be sent for approval to the Government of the Russian Federation.

In the future, the entire GLONASS navigation system will be upgraded to the new GLONASS-K2 devices, which are fully assembled on the basis of domestic products. The first GLONASS-K2 satellite is scheduled to be launched into orbit at the end of 2019 - the beginning of 2020. It’s interesting to note that, currently, the GLONASS system orbital network includes 26 satellites.

Durov accused the Russian authorities of trying to hack Telegram accounts of Ural journalists



Friday night, unknown persons tried to hack Telegram and Facebook accounts of famous journalists in Yekaterinburg. The Deputy Editor-in-Chief "URA.RU" Anton Olshannikov, PR specialist Platon Mamatov and the Editor-in-Chief of the site "MSTROK" (mstrok.ru) Natalia Vakhonina suffered from the actions of the unknown hacker. In addition, unknown persons attempted to gain access to the telegram channel of the portal "Momenty" (https://tlg.name/s/momenty_ekb/3292). It is interesting to note that all of them actively wrote about the protests against the construction of the temple in Yekaterinburg.

Hackers tried to log into the accounts of journalists from a desktop computer, the IP-address of which is registered in Spain, namely in Madrid. The two-factor authentication stopped hackers, but they managed to get confirmation codes from SMS. One of the victims asked for clarification to his mobile operator to find out how the attackers were able to enter the code, but he received the answer that the office does not "advise on these issues."

The journalists drew attention to the fact that they all actively participated in coverage of the protests related to the construction of the Church of St. Catherine in the Park near the Drama Theater in Yekaterinburg. From May 13 to 18 a number of unauthorized rallies of opponents and supporters of the Cathedral in the public garden took place in Yekaterinburg. About 100 people were detained in four days. After that, President Vladimir Putin intervened in the situation, who invited the local authorities to conduct a survey of citizens about their attitude to the construction project. On May 22, the survey data were published, showing that the majority of Yekaterinburg residents (74%) oppose the construction of a Temple.

The Creator of Telegram Pavel Durov said that Russian authorities tried to hack telegram accounts of Ural journalists. He connects the attack with the protests that continued in Yekaterinburg all last week.

“It reminds us that the authoritarian Government will stop at nothing to violate the privacy of its citizens,” wrote Pavel Durov in his Telegram channel. He emphasized that all hacking attempts failed.

Russia is ready to supply Vietnam with e-government technologies



The Ministry of Digital Development, Communications and Mass Communications of the Russian Federation reports that Russia is ready to supply Vietnam with e-government technologies, smart and safe city solutions, as well as information security products.

Rostelecom, Russia's largest provider of digital services and solutions, and Vietnam's leading provider of telecommunication services and information technology services Vietnam Posts and Telecommunications Group (VNPT) signed a Memorandum of understanding (MOU) aimed at developing cooperation in the field of information and communication technologies.

The Memorandum was signed by President and CEO of VNPT Pham Duc Long and President of Rostelecom Mikhail Oseevsky. The signing was attended by Prime Minister of Vietnam Nguyen Xuan Phuk and Prime Minister of the Russian Federation Dmitry Medvedev. In accordance with the text of the Memorandum, the main areas of cooperation are information security, e-government and smart cities.

The Memorandum involves the exchange of media products and programs, the implementation of joint thematic projects, press tours and internships of journalists.

In addition, Russia is ready to share its experience in the transition to digital broadcasting, to offer domestic equipment (digital broadcasting and television transmitters) for the Vietnam market and to establish cooperation in the design and construction of broadcasting networks.

According to Pham Duc Long, VNPT is implementing the digital transformation strategy to become the leading provider of digital services in the region. Cooperation with Rostelecom will help VNPT to successfully implement digital projects and e-government projects in Vietnam, helping to solve the important task of the digital transformation of Vietnam in the direction of digital government, digital economy and society.

Mikhail Oseevsky, President of Rostelecom, said that the business cooperation with VNPT in innovative high-tech platforms has been developing for the second year already. The signed Memorandum was an obvious confirmation of the interest of companies in the further expansion of cooperation.

The Dark Side of Kremlin- The Catalogue of Russian Data Leaks: All You Need To Know




Thousands of Russian emails and documents were leaked online in the late January in a catalogue named “The Dark Side of Kremlin”.


The catalogue was published by a “transparency collective” which goes by the name of “Distributed Denial of Secrets”.

DDoS encompasses an anonymous group of journalists, researchers, tech-experts and activists.

The documents contained private information regarding all the major hot-shots of Russia including the politicians, religious figures and the military.

The DDoS say, that their only job is to provide information to those who need it. If the information strengthens suspicions it hardly matters.

They also mentioned that their collection of data including emails, chat logs and attachments were hacked a few years ago by several hacking groups in Russia and Ukraine.

The Cyber Junta, Russian hackers Shaltai-Boltai, Ukrainian Cyber Alliance and other international parties were among the few accused.

The information leaked includes private documents and emails from the Ministry of Defense, the Russian Presidential Administration and other high-level political operatives.

Russia’s Prime Minister Dimitry Medvedev’s phone was hacked and his holiday pictures were uploaded online.

Russian President’s chef who controls companies that cater fancy banquets in Kremlin also lost his private notes to the leak.

The leak also includes the elaborate personal notes made by the chef on conversations between Putin and European leaders from Italy and Britain.

The most revealing hacks were the ones that came from the Russian Presidential Administration, which fairly let the Russian government, be a little more “transparent”.

The leak had details on how the government controls the Russian media and the way it transmits messages etc.

The most concerning part is that no one knows for sure how much and what kinds of information have been laid out bare in the open.

The leaks also provide an insight about the relations between Ukraine and Russia.

The inner-doings of Russia’s proxies and other insidious groups have also been brought into the light.

The DDoS had experienced a wipe on their servers making it imperative for them to upload it soon, in order to prevent the data from being censored.

Reportedly, this leak can’t be considered as a revenge for anything that has happened before, it was just an attempt at transparency.

A lot of the information present in the leaks was already available on the web but a lot of new investigations have been given birth due to this massive leakage.

This Russian document leak has created a paradigm shift in the way countries take their cyber-security seriously.

Analyzing these leaks could possibly lead Russia to adopting a new way of securing the web and its Presidential administration.

The government has already started taking care of its cyber-security vigilantly and all the loop holes will soon be filled up.

Anonymous use of messengers in Russia is prohibited


After 180 days, all messengers will be required to identify their users by phone numbers of operators. Prime Minister Dmitry Medvedev signed a government resolution approving the relevant rules last week. He believes that this is necessary for the safety and convenience of users.

The administrators of the messenger will check the information about the correctness of the number. The mobile operator is given 20 minutes to process the request from the Service.

Services will be available only to persons to whom the phone number is issued. In addition, mobile operators will enter information into their databases about which applications their customers are using.

According to the Head of Roskomnadzor Alexander Zharov, anonymous use of messengers prevents to investigate crimes. "The possibility of anonymous communication in messengers complicates the activities of Law Enforcement Agencies in the investigation of crimes."

In turn, the experts were skeptical about the initiative. Thus, the Director of the Association of professional users of social networks and messengers Vladimir Zykov believes that foreigners may face problems with SIM-cards of their countries. In addition, illegal sale of SIM cards of foreign operators may begin.

According to citizens, the legalization of relations between messengers and operators will only lead to negative consequences: the increase in the price of tariffs, the disappearance of anonymity in messengers, the growth of hacker attacks.

In General, the Russians do not believe that these rules will work at all. As we remember, Roskomnadzor's attempt to destroy Telegram led to the blocking of thousands of IP addresses and serious financial losses of innocent companies. And the messenger continued to work.
 

Investing in the digital economy - A Special communication network for Russian officials


The Russian government approved the national program "Digital economy" and allocated 1 trillion rubles (217 billions $) from the Federal budget for the implementation of the presidential task — in six years to triple domestic investment in the digital economy, to create a modern, safe and accessible to all IT-structure, to transfer state agencies mainly to Russian software.

In other words, the government decided to move from the category of countries with developing economies to the list of developed economies at the expense of IT-projects.

It is interesting to note that experts have already begun work on the creation of a wireless network for officials and representatives of law enforcement agencies. It should appear by 2024. You can find this proposal in the passport of the national program "Digital economy."

The network will use LTE-450 technology, which is characterized by high-speed and low latency data transmission. Devices in this range can work walkie-talkies, as well as transmit video.

By the way, for the operation of the announced network requires a frequency range of 450MHz, which uses the company Tele2. Tele2 representatives say that the company is ready to take part in the project and now they are discussing it with the authorities.

The passport of the "Digital Economy" does not say how much money will be required to create a communication network.

Ransomware Attack from Russian IP’s jeopardizes the Victims and Locks Their PC’s



A Newfound Ransomware by the name of Sigma is known to be spreading from Russia-based IP's with the assortment of social engineering procedures in order to jeopardize the victims and lock the contagion computer.

User's that were targeted on through the malignant SPAM Messages that contained a proclamation originated from the "United States District Court" with a pernicious attachment.


Presently the attackers utilizing the Email scam so as to make sure that the targeted victims perform the diverse malicious activities all the while manipulating the user by some emergency strings of dread and giving rise to the victim’s inquisitiveness.The Sigma Ransomware Attack directed from around 32 Russian based IP's and the attacker enlisted in the particular domain which is specifically utilized to perform different attacks.

The creators of the Malware utilized more obfuscation works by asking for the password to open the file and avoid the discovery.At first, the malignant documents required a password to open since it tricks the user to download the attachment that ought to be protected since the mail is originated from the court.

In the event that it finds that the Macros are turned off on the victim's machine then it further convinces the users to turn it on which contains malevolent VBScript.

Then, the VBScript will download the first Sigma Ransomware payload from the attack summon, control server and save it in the %TEMP% folder.Downloaded malware emulates as a legit svchost.exe process which assists in downloading an additional malware.

The Malware utilized a variety of obscurity strategy to conceal it and sidestep the discovery and it revokes itself on the off chance that it finds any virtual machine or sandboxes present.

 "Looking with malware so complex on the sides, social engineering traps and technical design is a challenge hard even for even security-mindful users," says Fatih Orhan, the Head of Comodo Threat Research Labs.

As indicated by the Comodo Research, uncommon to a portion of its ransomware relatives, Sigma does not act promptly but rather sneaks and makes secretive observations first. It makes a rundown of important documents, checks them and sends this incentive to its C&C server alongside other data 
about the victim's machine.

Likewise if the sigma Ransomware finds no files then it erases itself and it stops the infection in the event that it finds the country location of Russian Alliance or Ukraine. Later it associates with its order and control servers and builds up the Tor Connection and Sigma Ransomware begins to encode documents on the machine.

After the complete encryption, it will show the ransom notes of that contains the definite and detailed data of the attack and the request of the attack to the victims   to get in touch with them by means of sigmacs@protonmail.com and furthermore mentioning the infection ID.

Additionally, the attack demands the payoff sum through bitcoin and the cost will be settled in view of how instantly the victims contact to the attack.



Britain's National Cyber Security Centre Issues a Warning of a Global Campaign for the Possibility of Some Kind of Russian Activity


Britain's National Cyber Security Centre (NCSC) is on high caution for the likelihood of some kind of Russian movement. More people and resources have been dedicated towards the examination and investigation.

 The FBI and the US Department of Homeland Security issued a joint alarm cautioning of a global campaign with the foremost targets being internet service providers, firms running critical infrastructure, government departments and large companies.

White House cyber security co-ordinator Rob Joyce in a press conference session about the alert said that the US and its allies had "high confidence" that Russia was behind this "broad campaign".

He additionally said that, a huge number of machines coordinating information and data around the net were being targeted, as suggested by the insight gathered by the US and UK.

Despite the fact that it is conceivable that Russian intrusions might increment in the coming future, yet, it is too soon to be sure without a doubt if so. Up until this point, there has been moderately minimal indication of this in the US or UK, in spite of the fact that Russia is blamed for propelling ruinous attacks against Ukraine.

It merits saying that Britain and the US will do relatively indistinguishable activities in Russia, pre-positioning in Russian networks to have the capacity to react.

What nobody is very certain of is whether this makes an impediment somewhat like commonly assured nuclear destruction in the Cold War.
Furthermore, Mr. Joyce said that:
 “Many different organisations had come under attack for months at a time in a bid to scoop up valuable intellectual property, business information or to get at their customers and when we see malicious cyber-activity, whether Kremlin or other nation state actors, we are going to push back.

Ciaran Martin, head of the UK's NCSC, said that the issuing of the alert denoted a "significant moment" as the two forces had at no other time given joint exhortation on the most proficient method to manage attacks.

The worldwide crusade contained nitty gritty data about attack techniques, including the signs left when hardware has been compromised , and how networks arranges change when they have been broken.

Mr Martin said GCHQ, NCSC's parent association, had followed the risk postured by Russian cyber-gangs for over 20 years. Further intelligence about the attacks had been included by "multiple" cyber security associations and organizations, he added.

Nevertheless the guidance given to firms incorporates approaches to design their systems accurately and also gives an insight on how to apply patches to address hardware vulnerabilities