Get 40% Off
🚀 AI-picked stocks soar in May. PRFT is +55%—in just 16 days! Don’t miss June’s top picks.Unlock full list

Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network

Published 13/12/2023, 15:19
© Reuters. FILE PHOTO: The logo of Kyivstar, one of Ukraine's largest telecoms company, is pictured at the company's headquarters in Kiev, Ukraine, March 3, 2016. REUTERS/Gleb Garanich//File Photo
PSON
-

By James Pearson (LON:PSON) and Alexander Marrow

LONDON (Reuters) -A hacking group believed by Kyiv to be affiliated with Russian military intelligence claimed responsibility on Wednesday for a cyberattack that knocked Ukraine’s biggest mobile network operator offline.

Tuesday’s attack on Kyivstar, which has 24.3 million mobile subscribers and more than 1.1 million home internet users, knocked out services, damaged IT infrastructure, and silenced air raid alert systems in some parts of Ukraine.

A group of activist hackers, or "hacktivists", called Solntsepyok said in a post on the Telegram messaging app that it carried out the cyberattack, and published screenshots appearing to show that the hackers had accessed Kyivstar's servers.

Russia has repeatedly denied being behind such cyberattacks.

Ukraine's State Service of Special Communications and Information Protectorate (SSSCIP) said in a statement it was investigating the incident with the SBU domestic intelligence agency.

"Responsibility for the cyberattack was taken by one of the Russian groups whose activities are associated with the main directorate of the General Staff of the Armed Forces of the Russian Federation," it said, referring to Russia's GRU military intelligence agency.

"This once again confirms Russia's use of cyberspace as one of the domains of the war against Ukraine," it said, without naming the group that has claimed responsibility.

Earlier this year, the SSSCIP identified Solntsepyok as a front for a Russian hacking group dubbed "Sandworm" which has been previously linked to the GRU.

It was not immediately possible to contact the GRU for comment.

In its Telegram post announcing the hack, Solntsepyok thanked unidentified "concerned colleagues" at Kyivstar. The SBU said on Tuesday that it had opened a treason case following the cyberattack.

"We attacked Kyivstar because the company provides communications to the Ukrainian Armed Forces, as well as state bodies and Ukraine's security forces," that post said.

"To the other offices helping the Ukrainian Armed Forces: be prepared!"

On Tuesday, a source close to Kyivstar told Reuters that military communications had not been affected by the attack.

'WEAPON OF CHOICE'

Sandworm has been tracked by cybersecurity researchers as one of Russia’s most powerful hacking groups, responsible for cyberattacks against Ukraine’s energy sector.

“They regularly launder their operations through paper thin hacktivist personas," said John Hultquist, who heads threat analysis at Google (NASDAQ:GOOGL)'s Mandiant Intelligence.

“Sandworm is Moscow’s weapon of choice for cyberattacks. No other actor comes close in terms of the imminent threat they pose to critical infrastructure in Ukraine,” he added.

In response to a request for comment from Reuters, a representative of Solntsepyok confirmed it had carried out the attack and referred to the internal Kyivstar documents posted to the groups’ Telegram channel.

The representative did not respond to further requests for comment, including whether Solntsepyok was connected to the GRU.

Tuesday’s digital blitz was one of the biggest cyberattacks since Russia’s full-scale invasion of the country in February 2022. Such attacks which cause widespread and tangible damage are rare and require techniques so sophisticated that they are usually the domain of state intelligence agencies.

© Reuters. FILE PHOTO: The logo of Kyivstar, one of Ukraine's largest telecoms company, is pictured at the company's headquarters in Kiev, Ukraine, March 3, 2016. REUTERS/Gleb Garanich//File Photo

In its Telegram post, Solntsepyok said it destroyed more than 10,000 computers and 4,000 servers in the attack against Kyivstar, including its cloud storage and backup systems.

Kyivstar dismissed those claims as "fake" in a post on X, formerly known as Twitter. Kyivstar was in the process of restoring some of its services on Wednesday, its CEO said. 

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.