Ransomware Attacks: Ukraine Points Finger at Russian Security Services

Advertisement
By Reuters | Updated: 3 July 2017 10:50 IST

Ukraine said on Saturday that Russian security services were involved in a recent cyber-attack on the country, with the aim of destroying important data and spreading panic.

The SBU, Ukraine's state security service, said the attack, which started in Ukraine and spread around the world on Tuesday, was by the same hackers who attacked the Ukrainian power grid in December 2016. Ukrainian politicians were quick to blame Russia for Tuesday's attack, but a Kremlin spokesman dismissed "unfounded blanket accusations".

Cyber-security firms are trying to piece together who was behind the computer worm, dubbed NotPetya by some experts, which conked out computers, hit banks, disrupted shipping and shut down a chocolate factory in Australia.

Advertisement

The attack also hit major Russian firms, leading some cyber-security researchers to suggest that Moscow was not behind it.

Advertisement

The malicious code in the virus encrypted data on computers, and demanded victims pay a $300 ransom, similar to the extortion tactic used in a global WannaCry ransomware attack in May. But Ukrainian officials and some security experts say the ransomware feature was likely a smokescreen.

Petya Ransomware a 'Ruse' to Hide Cyber-Attack Culprit, Claim Researchers

Relations between Ukraine and Russia went into freefall after Moscow's annexation of Crimea in 2014 and the subsequent outbreak of a Kremlin-backed separatist insurgency in eastern Ukraine that has killed more than 10,000 people.

Advertisement

Hacking Ukrainian state institutions is part of what Ukraine says is a "hybrid war" by Russia on Kiev. Russia denies sending troops or military equipment to eastern Ukraine.

"The available data, including those obtained in cooperation with international antivirus companies, give us reason to believe that the same hacking groups are involved in the attacks, which in December 2016 attacked the financial system, transport and energy facilities of Ukraine using TeleBots and BlackEnergy," the SBU said.

Advertisement

"This testifies to the involvement of the special services of Russian Federation in this attack."

The SBU in an earlier statement on Friday said it had seized equipment it said belonged to Russian agents in May and June to launch cyber-attacks against Ukraine and other countries.

Referencing the $300 ransomware demand, the SBU said "the virus is cover for a large-scale attack on Ukraine. This is evidenced by a lack of a real mechanism for taking possession of the funds ... enrichment was not the aim of the attack."

"The main purpose of the virus was the destruction of important data, disrupting the work of public and private institutions in Ukraine and spreading panic among the people."

A cyber-attack in December on a Ukrainian state energy computer caused a power cut in the northern part of the capital Kiev.

The Russian foreign ministry and Federal Security Service did not immediately respond to requests for comment on the latest allegations.

Russian oil major Rosneft was one of the first companies to reveal it had been compromised by the virus and sources told Reuters on Thursday computers at state gas giant Gazprom had also been infected.

The SBU's accusations chime with some of the findings of the cyber-security firm ESET in Slovakia, which said in research published online on Friday that the Telebots group - which has links to BlackEnergy - was behind the attack.

"Collecting ransom money was never the top priority for the TeleBots group," it said, suggesting Ukraine was the target but the virus spread globally as "affected companies in other countries had VPN connections to their branches, or to business partners, in Ukraine."

"The TeleBots group continues to evolve in order to conduct disruptive attacks against Ukraine," it said.

"Prior to the outbreak, the Telebots group targeted mainly the financial sector. The latest outbreak was directed against businesses in Ukraine, but they apparently underestimated the malware' spreading capabilities. That's why the malware went out of control."

© Thomson Reuters 2017

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo Reno 15 Pro Max, Reno 15 Pro Launched Globally Alongside Reno 15
  2. Here's How Much the Realme 16 Pro Series Could Cost in India
  3. Beauty (2025) OTT Release Date: When and Where to Watch it Online?
  4. Vivo V70 Visits IMDA Database; Could Launch Soon With These Features
  5. Redmi Turbo 5, Turbo 5 Pro Might Be Equipped With These MediaTek Chips
  6. These Three Xiaomi 17 Series Phones Could Launch in India in Q1 2026
  7. MIT Develops 3D-Printable Aluminum Alloy That's Stronger Usual Metals
  8. New Study Explains Why Earth's Poles Are Heating Up at an Alarming Rate
  9. OnePlus 16 Could Feature Same Cameras as the Rumoured Oppo Find N6
  10. Xiaomi Mix 5 to Support Under-Display 3D Facial Recognition, Tipster Claims
  1. Oppo Find X9s Key Specifications Leaked Again; Might Also Launch in India
  2. Redmi Turbo 5, Redmi Turbo 5 Pro to Be Equipped With Upcoming MediaTek Dimensity Chips, Tipster Claims
  3. Vivo V70 Presence on IMDA Certification Database Points to Imminent Release
  4. MediaTek Dimensity 7100 Chipset Launched For Mid-Ranged Phones, Brings Efficiency Gains
  5. JWST Reveals Powerful Winds and Dense Atmosphere on Scorching Exoplanet TOI-561b
  6. New Year 2026 Scam Alert: This WhatsApp Greeting Could Wipe Your Bank Account
  7. Apple Fitness+ Teaser Hints at New Features Coming in January 2026
  8. An AI Pen? Jony Ive and OpenAI’s Secret Hardware Project Details Leak
  9. Oppo Reno 15 Pro Max, Reno 15 Pro With Dimensity 8450 SoC Launched Globally, Reno 15 Tags Along: Price, Specifications
  10. Hell’s Paradise Season 2 OTT Release Date Revealed: When and Where to Watch it Online?
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.