17:11 23.05.2018

SBU warns of possible large-scale cyberattack on govt institutions ahead of Champions League final

2 min read
SBU warns of possible large-scale cyberattack on govt institutions ahead of Champions League final

 The Security Service of Ukraine (SBU) warns of a possible large-scale cyberattack on Ukrainian government institutions and private companies ahead of the UEFA Champions League final and gives its recommendations on protection from it.

"The SBU's cybersecurity specialists are studying the next possible wave of a large-scale attack on network devices located in Ukraine. Malware that can be used by hackers has received the conditional name VPNFilter," the SBU's press center reported on Wednesday.

VPNFilter is a multi-level modular malware with versatile capabilities that support both cyber intelligence and destructive cyber operations.

The SBU noted that such attacks were recorded around the world, beginning in 2016. However, according to the information received, this time the geographic focus of the attack is directed to the Ukrainian segment of the Internet.

"Malware VPNFilter allows attackers to intercept all traffic passing through the affected device (including authorization data and personal data of payment systems), collect and upload information, remotely control the infected device and even disable it," the SBU said.

VPNFilter is especially dangerous for Supervisory Control and Data Acquisition (SCADA), because through the identification of specific protocols for the exchange of technological data, attackers are able to select such objects as priority targets. The revealed signs testify to the preparation of cyberattacks on the objects of the national critical infrastructure.

"SBU specialists believe that the infection of equipment on Ukrainian territory is preparation for the next act of cyber aggression by the Russian Federation aimed at destabilizing the situation during the Champions League final, as evidenced by the fact that the planned cyberattack mechanism coincides with the techniques used in the 2015-2016 during the BlackEnergy cyberattack," the report says.

AD
AD
AD
AD
AD