SBU exposes russian intelligence attempts to penetrate Armed Forces' planning operations system
The SBU cyber experts blocked attempts of russia’s military intelligence to gain access to the combat data exchange system of the Armed Forces of Ukraine.
Following investigative actions, the illegal activity of russian hackers aiming to penetrate Ukrainian military networks and establish intelligence gathering was exposed and blocked.
The SBU operational response prevented russia’s intelligence services from gaining access to sensitive information, including the activity of the Armed Forces, deployment of the Defense Forces, their technical provision, etc.
The defensive cyber operation was carried out jointly with the Armed Forces of Ukraine.
“Since the first days of the full-scale war, we have been fending off cyberattacks of russian intelligence services aiming to break our military command system and more. The operation we have carried out now is the cyber defense of our forces,” said the head of the SBU Cyber Security Department, Illia Vitiuk.
According to him, the responsibility for the cyberattacks lies with the controlled by russian military intelligence hacker group Sandworm.
The results of the investigation allowed the SBU cyber experts to conclude that the enemy captured Ukrainian tablets on the battlefield, pursuing the aim to spread malware and abuse available access to penetrate the system.
The SBU identified nearly 10 malware samples designed to extract information from the system.
The Security Service of Ukraine continues the ongoing cooperation with the General Staff of the Armed Forces of Ukraine in terms of documenting the illegal activity of enemy intelligence services and bringing the perpetrators to justice.