1. Sherdog will be undergoing additional maintenance in a few hours, lasting until 6am EST. The site may experience some technical difficulties during this time. We apologize for the inconvenience.

Malware Used In DNC Breach Found Tracking Ukraine Military

Discussion in 'The War Room' started by lecter, Dec 22, 2016.

  1. lecter

    lecter not even webscale

    Joined:
    Sep 13, 2012
    Messages:
    11,266
    Likes Received:
    28,988
    Vladimir bless!

    A good read, opposite to CNN etc
    If you're completely out of the loop I tried to explain the basic picture of the connection between Russian intelligence agencies and advanced persistent threats in another thread, Fancy Bear would be such a group and is one of the two groups which was more or less found responsible for the DNC breach.

    Now their signature was found on compromised devices of Ukraine's military.
    http://www.darkreading.com/threat-i...und-tracking-ukraine-military/d/d-id/1327778?

    A quite interesting read.
     
  2. VivaRevolution

    VivaRevolution Banned Banned

    Joined:
    Feb 2, 2016
    Messages:
    34,022
    Likes Received:
    41,477

    Put this nonsense to rest NSA. Show us the packet transfer across the fiber optic cables.

    If the DNC was hacked, we know for a fact that the NSA has this info.

    No need for this Sherlock Holmes type deduction.

    Either the NSA has the smoking gun, and it was a hack whose origin can be traced, or they don't, and this was a leak.
     
  3. Big_Chief_Stove

    Big_Chief_Stove Silver Belt

    Joined:
    Mar 22, 2008
    Messages:
    10,888
    Likes Received:
    5,895
    Location:
    Up North
    No hack, just leaks.
     
  4. sub_thug

    sub_thug Silver Belt

    Joined:
    Oct 31, 2008
    Messages:
    10,275
    Likes Received:
    10,425
    Russia probably hacked the DNC servers. The Dark Reading article clearly suggests it. It's not like cracking email servers is that difficult, and the DNC servers are better protected just because they belong to the DNC. A simple phishing attack would have been enough to get the foothold needed to access those servers.

    Let me play devil's advocate for a second: once a malware has been released, it's not like a bomb. Bombs explode, and you can't use them again. Malware is like a spear. If someone throws it at you, you have it, and you can throw it at whoever you want. Anyone infected with Russian malware designed to spy on the Ukrainian military could spread it around, using it to spy on someone else. Stuxnet, a piece of malware largely believed to have been designed by the US and Israel to destroy Iranian nuclear centrifuges, was discovered on American computers by antivirus guys. It was found in countries around the world.
     
  5. Kingz

    Kingz Gold Belt

    Joined:
    Aug 31, 2009
    Messages:
    18,556
    Likes Received:
    24,317
    Location:
    West Sacramento, CA
    I wonder how the media feels about Putin doing a better job of informing Americans than they do.
     
    VivaRevolution likes this.
  6. ShadowRun

    ShadowRun error Platinum Member

    Joined:
    May 27, 2009
    Messages:
    11,414
    Likes Received:
    8,461
    So this is based off Fancy Bear APT's signature in malware that the company crowdstrike says is part of Russia. A lot of assumptions in the cyber security world. I would think a APT would use different malware that doesn't have snort rules defined by their own name lol
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.