深夜福利影视-深夜福利影院-深夜福利影院在线-深夜福利影院在线观看-深夜福利在线播放-深夜福利在线导航-深夜福利在线观看八区-深夜福利在线观看免费

【video hi?p dam th?t】Enter to watch online.DOJ charges Russian hackers with attacks on Olympics, French elections

【video hi?p dam th?t】Enter to watch online.DOJ charges Russian hackers with attacks on Olympics, French elections

The video hi?p dam th?tU.S. Department of Justice plays the long game.

That much was made clear Monday as the DOJ announced charges against six Russian military officers accused of launching a string of damaging cyberattacks dating back to 2015. The men, all members of the Russian Main Intelligence Directorate (GRU), are allegedly behind the notoriously destructive NotPetya and Olympic Destroyer malware (among others).

NotPetya, disguised as ransomware, is a type of malware that appeared to intentionally damage victims' computer systems. Unlike typical ransomware, which encrypts users' files and demands payment to unlock them, NotPetya seemed designed to destroy what it touched. The Olympic Destroyer malware, for its part, targeted the 2018 Winter Olympics, and security experts at the time described its goal as one of "embarrassment."


You May Also Like

Like the famed WannaCry ransomware, NotPetya employed a leaked NSA exploit known as EternalBlue to power its spread.

Monday's press release and corresponding unsealed indictment lay out the vast scale of the operation which began around November of 2015.

These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation's flag, as a consequence of Russian government-sponsored doping effort.

The DOJ alleges that, in addition to the above-listed victims, the NotPetya malware disrupted hospital systems in the U.S. One such victim, cited in the press release, is Western Pennsylvania's Heritage Valley health care system. The malware reportedly "caused the unavailability of patient lists, patient history, physical examination files, and laboratory records" as well as prevented access to "mission-critical computer systems (such as those relating to cardiology, nuclear medicine, radiology, and surgery) for approximately one week[.]"

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

This tangible impact on real people's health was on top of the close to $1 billion in financial damages allegedly suffered by the Heritage Valley Health System, a FedEx Corporation subsidiary, and an unnamed "large U.S. pharmaceutical manufacturer."

A third strain of malware, KillDisk, was allegedly designed by one of the indicted Russian hackers. It would, in addition to destroying computer files, draw an image of the mask from the show Mr. Roboton victims' computer screens.

Mashable ImageThis is the real image, contained in the indictment, that would show up on some victims' computers. Credit: screenshot / doj unsealed indictment

"[Pavel Valeryevich Frolov] designed the malware to draw the image in real time on the infected computer's screen," reads the unsealed indictment.

In addition to leaving a pop culture calling card, KillDisk was intended to "delete computer event logs and other files and reboot the infected computers," explains the indictment. "Once rebooted, the infected computers were inoperable."

Mashable ImageAlleged GRU hackers. Credit: Doj

The six men, ranging in age from 27 to 35, are charged with "conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers, and aggravated identity theft."

Mashable ImageThese guys, too. Credit: doj

Notably, tech giants played a role in getting to the bottom of the attacks. The press release specifically thanks Google, Cisco, Facebook, and Twitter for "the assistance they provided in this investigation."

Mashable ImageAnd two more. Credit: doj

While if convicted the six men would face potentially decades in prison, they are not currently in custody. As of Monday, they were all listed on the FBI's most wanted cybercriminals list.

Topics Cybersecurity

Latest Updates

主站蜘蛛池模板: 国产av一区二区三区日 | 91精品国产99久久青草蜜桃 | 国产亚洲精品97aa片在线播放 | 国产精品密蕾丝视 | 91精品一区二区综合在线 | 99久久精品日本一区二区免费 | 国产狂喷潮视频在线播放 | 99精品国产九九国产精品 | 国产成人8x人网站视频下载 | 国产日韩精品欧美在线ccc | 国产精品日本人妖 | 国产成年女人人aa人视频高清 | www成人网 | 国产ww久久久 | 国内丰满少妇一a级毛片视频 | 成人亚洲免费在线观看 | 丰满爆乳美女在线视 | 成人精品天堂一区二区三区 | 精产国品一二三产品麻豆 | 99久久久久久久免费a片观看 | 成人在线视频 | 精品久久久久久五无码人妻热 | 精品亚洲a∨在线播放不卡 精品亚洲aⅴ无码午夜在线 | 国产午夜人做人免费视频网 | 国产一区二区三区精华 | 国产午夜精品精品 | 国产v一区二区三区日 | 18禁无遮挡无码不卡网站 | 99精品国产兔费观看久久 | 国产美女嘘嘘嘘嘘嘘 | 国产一区二区三精品久久久无广告 | 国产福利短片视频在线观看 | 国产私拍福利在线观看视频 | 高清无码在国产极 | 国产精品原创av片国产日韩 | 国产精品一品 | 国产一区二区三区精品视频 | 国产精品视频无码 | 国产a级理论片无码老男人 国产a级毛 | 国产a网欧美午夜性 | 国产aⅴ一区二区三区精品 国产aⅴ一区二区三区片 |