IN UKRAINE
Fraud with cash payments to Ukrainians
Cyberpolice warns against fraud with the payment of financial aid to Ukrainians during martial law. Offenders send SMS messages about the payment of material assistance to internally displaced people. In the message, fraudsters also indicate a link to a resource where you can allegedly apply for assistance. According to the link, citizens are asked to enter personal data and a bank card number to credit money. In such cases, scammers use phishing. Citizens, by indicating confidential data on suspicious resources, automatically pass it on to fraudsters. Then the attackers misappropriate the money of Ukrainians. Details — follow the link
IN RUSSIA
Activity Anonymous
Hackers Anonymous have hacked the base of GUOV and the Central Bank (Main Directorate of Troops and Civil Engineering), the ultimate owner of which is the russian Defense Ministry. As a result of the hack, 9.5 GB of data got into the network, including more than 15 thousand e-mails of the company. The hackers announced this on their official Twitter page. GUOV and the Central Bank was established in September 2020, has the status of a limited liability company and a minimum authorized capital of 10 thousand rubles. At the same time, until 2021 it was unprofitable, and last year it signed contracts for 258.4 million rubles. In total, according to Spark-Interfax, the company’s revenue is over 26 billion rubles. The company’s range of activities is extremely wide and includes 69 areas: construction of civilian and military facilities, extraction, processing and sale of building materials, transportation of goods in various ways, production of petroleum products and explosives and even photography. Details — follow the link
«Technological sovereignty» in the information space
Taking into account the growing pressure of sanctions, which dealt a colossal blow to russian IT and telecoms, putin issued a decree establishing an interagency commission responsible for russia’s «technological sovereignty» of the information space. So far, these are only critical infrastructure facilities. This means that russia is preparing for the Iron Curtain in the digital environment. The heads of the FSB, Rosguard, Ministry of Defense, FIS, MIA, ME, Ministry of Industry and Trade, Ministry of Education, Ministry of Transport, Ministry of Finance, Ministry of Digital Transformation, Ministry of Economic Development, Ministry of Energy, Central Bank of russia, FMS, rosatom, others and roscosmos will ensure independence from the global network. In total – 27 members. And it will be headed by Dmitry Medvedev. Formally, this initiative is dictated by practical motives, the lack of Western technology must be compensated by кussia’s favorite business – import substitution. However, the creation of a sovereign network will allow full control of the flow of information within the country, making the dictatorship of the Kremlin absolute. Details — follow the link
Hacking of the site of the Ministry of Emergencies of russia
The russian Emergencies Ministry’s website has written recommendations «in the event of a retaliatory nuclear strike by NATO».Later it was reported about the break-in. The russian Emergencies Ministry’s media outlet has published recommendations “in the event of a nuclear retaliatory strike by NATO». The website reported that “according to operational data during the mass celebrations of Easter on April 24, 2022, there may be a threat of a nuclear retaliatory strike from NATO». Later, the resource was unavailable, and on his VKontakte page there was a message that the site had been hacked, and information about the nuclear strike was not true. Details — follow the link
IT Army of Ukraine
On April 20, the IT Army of Ukraine will focus its efforts on attacking fiscal data operators, intermediaries between online cash registers and the tax service. Details — follow the link
IN WORLD
NATO has staged a virtual cyber war to prepare for a real attack on russia
Cybersecurity experts from 30 NATO members have launched a large-scale Locked Shields exercise aimed at working out to prevent an attack on a fictional state. According to the legend of the exercises, cyber defense will concern the fictional island state of Beryllium in the Atlantic Ocean. Researchers hope that the lessons learned from the staged cyberattack will better prepare them for the possibility of a russian attack. The NATO Joint Cyber Defense Center of Excellence holds Locked Shields annually, but in 2022 the training will be much more serious. Cybersecurity experts are trying to find cracks in their defenses and fix them, as there are real fears of a cyber attack against Ukraine and countries bordering NATO. In military games, participants representing NATO countries will face numerous “hostile incidents” targeting both military and civilian IT systems. According to the cyber game legend, the attacks will target Beryllium’s communications, as well as its government and military networks, water purification systems and electricity grid. According to a CCDCOE spokesman, this year’s cyber game will include modeling of reserve management systems and central bank financial communications. Participants will also respond to incidents involving the 5G Standalone mobile platform, which is considered a critical infrastructure. Details — follow the link
Senator business center, 32/2, Dukes of Ostrozhsky, Kyiv
+38 (050) 428 44 68 (Ukraine), +1 (786) 755 8398 (USA)© 2023 GLOBAL CYBER COOPERATIVE CENTER (GC3). All rights reserved