in today’s investigate of cyber insurance tech report the combat in ukraine is heating up and so are the combats in cyberspace in this video i’ll be dealing everything that’s happened in the last day or two in the world of cyber confrontation when it comes to the invasion of ukraine firstly anonymous has hacked the russian ministry of defense and spilt some data the opening contains a database of telephone number emails and passwords belonging to russian military officials many of the hacked emails cease in mil fleck quarrel or gov scatter are you in other words these can only belong to the russian military and government now i’m not going to show any of the leaked data relating to this video because i’m pretty sure that’s against youtube’s community guidelines in fact shortly after an anonymous related report tweeted it twitter attracted it down and the mega download associate was made altogether offline but despite that the seep will have already done its chore the russian ministry of protection will have locked down chronicles and whilst it won’t make them long to recover from this the whole idea will have been to create as much disruption as possible to the russian military’s operations but anonymous should not stop the car things got a whole lot more interesting in a different enterprise which also has happened simply in the last day or so a group calling themselves anonymous liberland teamed up with a hacking group disappearing by the name ponbar hack team they hacked into the belarusian’s weapons manufacturer tetrader or however it’s pronounced regardles this busines becomes artilleries for the russian military members and they’re said to have been instrumental in providing logistical support for putin’s invasion of ukraine now the hackers exhausted a statement in which they lampoon russian threat radicals saying our russian apt friends seem kind of out of shape don’t they defacements ddos attacks what time is this 2012 we contemplated maybe they needed a little reminder of what real hacking is like and so after spoofing the weapons creator they divulged 200 gigabytes of emails they claim included are the schematics for some of those sams here they’re referring to surface-to-air missile systems like this one made by tetrader but how did this duo gain access apparently through microsoft exchange vulnerability proxy logon this allows an attacker to bypass authentication to a microsoft exchange email server and advantage admin privileges a spot for this was liberated a year ago but it seems tetrader simply never inconvenienced to update their methods the security company’s website is now offline and the leak is being disseminated through assigned denial of mysteries an organization which multitudes data holes it’s too soon to say what effects this disclose will have as 200 gigabytes is a lot of emails so it’ll take a good while for parties to go through it all next up in the last day or so the cyber offender underworld has started taking surfaces in this war the province cyber crime group has declared full subsistence of the russian government if you’re not familiar conti is one of the world’s most prolific and dangerous ransomware organizations one of their most famous hackers has just taken place in may of last year when they absolutely debilitated ireland’s healthcare plan with ransomware conti liberated a declaration on their nighttime entanglement blog saying they’re announcing full help of the russian government if anyone decides to organize a cyber affect or any struggle works against russia we will use all possible resources to strike back at the critical infrastructure of the adversary this kind of language is unheard of when it comes to cyber crimes some people have interpreted their statements as proof that they’re working with or at least supported by the russian government though there is a more nuanced perspective for the last few years russian cyber felons have for the most part been left alone by russian the administration has do their thing but after the maverick ransomware mob was arrested by russian secret service really a few weeks ago the whole russian cyber criminal community has been worrying about putin finally cracking down on them and so conti’s statement of support for the putin regime may only be a sardonic attempt to cozy up to putin hoping that if they obligation devotion to him then maybe he’ll just leave them alone to do their ransoming however there is a twist conti changed their statements exclusively an hour after announcing it swapping their position to we do not ally with any government and we denounce the ongoing battle but they keep their threat of using their full capability to deliver retaliatory measures in case the countries of the western aggressors attempt to target critical infrastructure in russia so why the change of heart it’s possible conti realise whilst they were minimizing their risk from russian arbiters they were really moving themselves a target for others as this meme i found on twitter eloquently shows or perhaps conti just didn’t realize that cyber felons are actually quite fractioned on this and that they would rather not form adversaries within their own community for example raid forums a popular cyber criminal meeting has apparently imposed restrictions on russian useds an admin posted any customer found to be connecting from russia will be banned this is not a joke raid forums is an english-speaking forum but no doubt a good hunk of their customers will be based in russia so this is a surprising move another raidforms user made it very clear whose side they’re on by posting a data drop of emails and hash passwords belonging to the fsb.iu domain the fsb is essentially the russian account of the fbi and as i mentioned in my previous video the ukrainian military is openly reaching out to ukrainian cyber felons encouraging them to employed their skills to good use and volunteer for the military cyber gangs they have a google patterns page for parties to apply through and it shows they’re looking for people with skills such as social engineering red teaming and threat intelligence and ukraine could use greater defensive cyber capabilities for example the belarusian state hacking radical unc 1151 has been targeting ukrainian military personnel with phishing expeditions soldiers have been receiving emails saying clink the link below and verify your contact information otherwise your chronicle will be retrievably deleted the email is then linked to a sheet for beings to type in their username and password now this is obvious bs purely an attempt to scoop up email credentials of parties in the ukrainian armed why well the belarusians won’t be looking for anything in particular but very to see what they can learn from soldiers contents such as insights into ukrainian military strategy and how or where they’re being deployed speaking of spam and this is kind of shocking but i belief it shouldn’t be surprising scammers ought to have employing the intrusion and setting up fake donation pages attempting to trick parties into sending them coin with the cover story that the money will go to help people in ukraine so if you are looking to donate money be careful the official ukraine twitter accounts tweeted that they’re now admitting donations in bitcoin and ethereum and at first parties be said that the history had only just been spoofed but no this is legit so far millions have been bequeathed so this is what we know so far when it comes to the ukrainian cyber warfare situation likewise several hacktivist radicals have contacted me both pro-russians and pro-ukrainians and it was like i’m actually going to be doing interviews with them i’m taking suggestions for questions to ask them over on my instagram narrative which i will attach in the video description biding fasten online should be number one but amenity is important more that’s why i’ve teamed up with roboform who are sponsoring this video roboform’s password administrator deters your password synced across all your inventions ready for when you need them it even works on linux and exclusively you comprise the decryption key so your plateau textbook passwords never touch robo model servers i’ve personally been using robiform every day for the past six months because i think they strike the right balance between security and convenience use the link in the description now to get robo form for only a little over a dollar a few months and get 30 off only when you use the link below and if you decide robiform isn’t for you they have a 30 date no questions asked refund policy as ever thank you for watching and if you find these updates on the ukrainian cyber warfare situation useful make sure to tickle the notification loops you get the updates as soon as they go live and follow me on the instagrams for behind the scenes material and i’ll see you in the next video have a good one
Download a Free Prescription Drug Card
