The 11th of April, Cyber News


The SSU has liquidated hostile intelligence networks that were carrying out cyber-attacks and information sabotage against Ukraine

The bot farm of special services of the russian Federation has been exposed in Zhytomyr region. This “incubator” of tens of thousands of fake accounts has carried out cyber attacks on government information resources and critical infrastructure systems. An “expert on energy issues” who collaborated with russian rossiya Segodnya news agency has been detained in Kyiv, spreading Kremlin propaganda for millions of “fees” from russia. In Kirovohrad region, an official of one of the courts has been detained, which on social networks called for the seizure of state power in Ukraine and justified the aggression of the russian Federation. In Cherkasy region, two collaborators have been exposed for spreading misinformation about the situation at the front and justifying the bombing of Ukrainian cities. According to the facts of the crimes, comprehensive measures are underway to identify all participants in the aggression against our state. See the link

Cyber ​​police has exposed individuals who helped occupiers to provide anonymity online for the attacks on the resources

Three residents of Chernivtsi region organized the operation of a network of proxy servers. Users from russia were able to hide IP addresses and anonymize their activities on the Internet for further illegal actions in cyberspace. The attackers set up proxy servers and leased them to russian citizens. These services are currently being tested for the possibility of using DDoS-attacks, unauthorized interference in Ukrainian information resources, distribution of destructive content in Ukraine. See the link

Ukrainian cyber troops have hacked the site of Donetsk railways in the “pseudo-republic of the DPR” and indicated one direction for all warehouses

If you try to enter the query “pseudo-republic railway” in Google search engine, it will be the first to publish its site. However, instead of the usual name after the work of hackers, there is a slightly improved one – “go F**K yourself!” On the site itself, against the background of photos showing numerous destructions in Ukrainian cities and villages, as well as victims of aggression by Russian invaders, there are messages for the militants. “russian military train, follow the russian warship, go f**k yourself!” – it says. In the end, Ukrainian hackers added a few words in English: “Task completed!”. See the link

The 11th of April, Cyber News


Successful cyber attack on the Ministry of Industry and Trade of the aggressor country
The Ministry of Industry and Trade of the aggressor country acknowledged its inability to resist the attack and allowed certain goods not to be labeled, as well as goods to be put into circulation without checking the availability of labels in the system for April 7-11. See the link

Anonymous has released more than 2 million Russian emails

Following the announcing of the “cyber war” by the Kremlin criminal regime, Anonymous has released more than 2 million russian emails through DDoSecrets. In the coming days, the Anonymous team will release other data on russian organizations. This has been reported by Anonymous in his Twitter. See the link



Cyber attacks on the websites of the Ministry of Foreign Affairs and the Ministry of Defense of Finland

The websites of a number of Finnish agencies, including the Ministry of Defense and the Ministry of Foreign Affairs, have been cyberattacked. Nordea Bank also had problems accessing the site. The Ministry of Defense and Foreign Affairs confirmed that it had been a cyber attack. The customers of Nordea also had problems trying to use the company’s services. The bank does not comment on whether this is a cyber attack. See the link

Munich Re tightens up cyber insurance policies to exclude war

Munich Re is seeking clearer war exclusion clauses in cyber policies, based on wording developed last year in the Lloyd’s of London market. The invasion of Ukraine was not a “classic cyber war,” said Juergen Reinhart, chief underwriter, cyber, at Munich Re, but he said it was best to be prepared. Munich Re was looking to bring in new wordings on its direct cyber insurance products, Reinhart said. The reinsurer was also suggesting to its cyber insurer clients that they introduce similar clauses. See the link