industryterm:email systems

  • Putin Controls All Ukraine’s Airwaves, Phones and Computers
    http://www.newsweek.com/putin-controls-all-ukraines-airwaves-phones-and-computers-332439

    (eh ! c’est pas juste ! y a que Obama, Cameron et Merkel qu’ont le droit de faire ça !)

    Hackers have consistently used low-level cyberwarfare tactics to advance Russian goals in Ukraine.

    A dedicated group of hackers successfully infected the email systems of the Ukrainian military, counterintelligence, border patrol and local police. The hackers use a spear-#phishing attack in which malware is hidden in an attachment that appears to be an official Ukrainian government email.

    For the most part, the technologies are not advanced but the attacks have been persistent. Lookingglass, a cybersecurity firm, suspects the Russian Federal Security Service (FSB) is the culprit behind the virus dubbed Operation Armageddon.

    The Russian government is likely behind an even more dangerous virus. Since 2010, BAE Systems has been monitoring the activities of malware they dubbed Snake, and numerous digital footprints point to the Russian Bear. Moscow time-zone stamps were left in the code and Russian names are written into the software.

    Other clues point to the Kremlin. “It’s unlikely to be hacktivists who made this. The level of sophistication is too high. It is very well written—and extremely stealthy,” observed Dave Garfield, BAE’s managing director for cybersecurity.

    Et puis, aussi, y font rien que copier. Pourquoi est-ce que personne a pensé à copyrighter Stuxnet, d’abord ?

    The malware establishes a “digital beachhead” that allows its operators to deliver malicious code to the targeted networks. The implications are far-reaching: “Russia not only now has complete informational dominance in Ukraine,” an intelligence analyst told the Financial Times, “it also has effective control of the country’s digital systems, too. It has set the stage.

    Ils trouvent des failles zero day

    Another hacker group in Russia exploited a security flaw in Microsoft Windows software to spy on NATO, Ukraine and several other targets. Dubbed Sandworm Team after researchers discovered references in the code to the Dune series of science-fiction novels, the group used a “zero day” attack—a flaw in the software that has not been previously identified and for which there is no pre-existing fix—which is usually associated with deep pockets.

    Et ça continue…

    So far, Russian cyberattacks have been relatively low-key. There’s an obvious reason why: The Kremlin already has access to Ukrainian telecommunications. Russia built the system. Even the system Ukraine uses to monitor the activities of its own citizens, System for Operative Investigative Activities, or SORM, was originally developed by the Russian KGB.

    D’ailleurs, les drones des É.-U., y s’en vont tout seuls chez l’ennemi (comme en Iran)

    U.S. technology is also vulnerable: Russia claims (and the Pentagon denies) that it used its control of the cyberbattlefield to intercept a U.S. drone as it patrolled Crimean skies on March 14, 2014.

    Bref…

    Russia controls the airwaves, the phone lines and the computers. The Ukrainian government needs to rebuild its telecommunications network using non-Russian companies and technology. In the short term, U.S. diplomats and military trainers in Ukraine should avoid using Ukrainian communications. The United States also needs to harden its communications to avoid incidents such as the rumored drone intercept.

    Avec du matos américain, vous serez à l’abri des interceptions non souhaitées !
    #apothéose !