✅ Fact-checked    

British intelligence opened a workshop of the operation of Russian hackers: details

The networks of the Iranian hacker group OilRig were hacked by Russian hackers from the Turla group

Photo: pexels.com

After the intelligence of the four countries revealed the secret unit of Russia to destabilize the situation in Europe, data appeared on a new investigation into the activities of Russian hackers. So, hackers from Russia, pretending to be Iranian, carried out cyber attacks in more than 35 countries of the world. This was reported by the BBC with reference to the report of the British National Cybersecurity Center (NCSC) and the US National Security Agency (NSA).

“We have never seen this done with such skill. It is actually very difficult to disguise (as a different group),” said Paul Chichester, NCSC Operations Director.

According to intelligence from the UK and the US, the networks of the Iranian hacker group OilRig were hacked by Russian hackers from the Turla group, in order to then spy on several countries using resources obtained from Iranians.

The investigation began in 2017 when a cyber attack on a British academic institution was committed. During inspections, the NCSC found that the attack on the organization was carried out by the Turla group, which used the tools and methods of OilRig.

Most cyber-attacks were recorded in countries in the Middle East. The purpose of the group was to obtain classified information from a number of government agencies.

According to the report, at the moment there is no evidence that the Iranian group was an accomplice in cyber-attacks or knew that hackers from Russia were using their resources.

The BBC explains that although the NCSC does not directly connect these cyberattacks with the authorities of the Russian Federation or Iran, earlier observers pointed out Turla’s connection with Russian government agencies and OilRig with Iranian ones.

Views: 283

Add a comment!

Your name:
Your Email:
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
The code:
Кликните на изображение чтобы обновить код, если он неразборчив
Enter a code: