Global cyber attack likely cover for malware installation in Ukraine: police official | Reuters

By Pavel Polityuk | KIEV KIEV The primary target of a crippling computer virus that spread from Ukraine across the world this week is highly likely to have been that country's computer infrastructure, a top Ukrainian police official told Reuters on Thursday. Cyber security firms are trying to piece together who was behind the computer worm, which has paralyzed thousands of machines worldwide, shutting down ports, factories and offices as it spread through internal organizational networks to an estimated 60 countries.Ukrainian politicians were quick on Tuesday to blame Russia, but a Kremlin spokesman dismissed 'unfounded blanket accusations'.

Reuters June 29, 2017 22:03:52 IST
Global cyber attack likely cover for malware installation in Ukraine: police official
| Reuters

Global cyber attack likely cover for malware installation in Ukraine police official
 Reuters

By Pavel Polityuk
| KIEV

KIEV The primary target of a crippling computer virus that spread from Ukraine across the world this week is highly likely to have been that country's computer infrastructure, a top Ukrainian police official told Reuters on Thursday. Cyber security firms are trying to piece together who was behind the computer worm, which has paralyzed thousands of machines worldwide, shutting down ports, factories and offices as it spread through internal organizational networks to an estimated 60 countries.Ukrainian politicians were quick on Tuesday to blame Russia, but a Kremlin spokesman dismissed "unfounded blanket accusations". Kiev has blamed Moscow for two previous cyber strikes on the Ukrainian power grid and other attacks since Russia annexed Crimea in 2014. A growing consensus among security researchers, armed with technical evidence, suggests the main purpose of the attack was to install new malware on computers at government and commercial organizations in Ukraine. Rather than extortion, the goal may be to plant the seeds of future sabotage, experts said.International firms appear to have been hit through their operations in the country.

Slovakian security software firm ESET released statistics on Thursday showing 75 percent of the infections detected among its global customer base were in Ukraine, and that all of the top 10 countries hit were located in central, eastern or southern Europe.The malicious code in the new virus encrypted data on computers and demanded victims pay a $300 ransom, similar to extortion tactic used in the global WannaCry ransomware attack in May.Echoing working hypotheses from top cyber security firms including Cisco and Kaspersky, a top Ukrainian official told Reuters that the ransom demands were likely a smokescreen.

"Since the virus was modified to encrypt all data and make decryption impossible, the likelihood of it being done to install new malware is high," the official, who declined to be identified, wrote in a phone text message to Reuters.Information Systems Security Partners (ISSP), a Kiev-based cyber research firm that has investigated previous cyber attacks against Ukraine, is pursuing the same line of inquiry.ISSP said that given that few people actually paid the $300 demanded for removing the virus, money was unlikely to be the primary object of the attack.

"It's highly likely that during this attack new attacks were set up," said ISSP chairman Oleg Derevianko."At almost all organizations whose network domains were infected, not all computers went offline," he said by phone. "Why didn't they all go offline? We are trying to understand what they might have left on those machines that weren't hit." Some cyber security researchers have said the fact that the Kremlin's two flagship energy companies are victims of the attack suggests Moscow was not behind it.Russian oil major Rosneft (ROSN.MM) was one of the first companies to reveal it had been compromised by the virus and sources told Reuters on Thursday computers at state gas giant Gazprom (GAZP.MM) has also been infected. (Additional reporting by Eric Auchard in Frankfurt, Jack Stubbs in Moscow and Mark Hosenball in Washington D.C.; writing by Matthias Williams; editing by John Stonestreet)

This story has not been edited by Firstpost staff and is generated by auto-feed.

Updated Date:

TAGS:

also read

Apple will enable storage of IDs like drivers licenses on iPhones
Business

Apple will enable storage of IDs like drivers licenses on iPhones

By Stephen Nellis (Reuters) -Apple Inc on Monday said it will offer the ability to store state-issued identification cards digitally on iPhones and that it is working with the U.S. Transportation Security Administration to accept the digital IDs at airports, one of several updates to the software that runs on its devices. It also showed updates to its FaceTime video chat app, adding the ability to schedule calls with multiple attendees and making the software compatible with Android and Windows devices.

Airline bosses call on UK and U.S. to lift trans-Atlantic travel restrictions
Business

Airline bosses call on UK and U.S. to lift trans-Atlantic travel restrictions

LONDON (Reuters) - The bosses of all airlines flying passenger services between Britain and the United States called on Monday for the countries' governments to relax COVID-19 restrictions to reopen travel routes between the two countries. After more than a year of restrictions, the CEOs of American Airlines, IAG unit British Airways, Delta Air Lines, United Airlines and JetBlue Airways Corp said high vaccination rates in both countries meant travel could restart safely. The push for reopening trans-Atlantic routes on Monday comes ahead of meetings between U.S.

EU patience wearing thin with UK on N.Ireland, weighing options
Business

EU patience wearing thin with UK on N.Ireland, weighing options

BRUSSELS (Reuters) - The European Union's patience towards Britain over Brexit arrangements in Northern Ireland is wearing thin and the bloc will consider its options should Britain continue its "confrontational path", an EU official said on Monday.