31.03.2023 | 16:37
Još malo hakeraja, ali Ruskog:
> Unit 74455 from the Russian GRU, codename "Sandworm," was responsible for the attacks in France and South Korea at the very least. It is considered the most dangerous group of hackers in the world, and Vulkan, according to the documents, may provide them with some of the tools they need for their attacks.
> Until now, investigators have only been able to retroactively analyze the tracks left behind by such cyberattacks. But now, the Vulkan Files enable a detailed understanding of how such attacks are prepared and organized, and how aggressively Vladimir Putin, with the help of private companies, plans and implements hacking operations around the world. The documents allow a step-by-step look at how such attacks are intended to proceed.
> Most of the documents are from an anonymous source. A few days after the Russian invasion of Ukraine, that source made the information available to the German daily Süddeutsche Zeitung, later sharing it with DER SPIEGEL as well. "Because of the events in Ukraine, I decided to make this information public,” said the source, who never identified themself and has since receded. "The GRU and FSB are hiding behind this company. People should know about the dangers.”
> Five Western intelligence agencies also confirmed the authenticity of the documents. Most of those agencies have been keeping an eye on Vulkan for some time because of the work the company does for intelligence agencies. Vulkan appears to be part of the opaque military-industrial complex in which Russian intelligence agencies work closely with more than 40 private IT companies. One of their goals is to develop highly effective cyberweapons that can be used against all those that the Kremlin has identified as Russia’s enemies. Especially, of course, in the West.
> "Russia is in our networks,” warns Wolfgang Wien, deputy head of the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency. Countries ensure that their hackers are well-prepared, he says, so that they can deploy quickly when ordered to do so.
> It’s a frightening thought, one of many that arises when one dives into the dark world of hackers, agents and saboteurs. Another: Russian cyberwarriors don’t just hunker down in their secret bunkers and hidden headquarters somewhere in Moscow. Some have obtained jobs at multinational companies, including some in Germany. DER SPIEGEL has been able to track down former Vulkan employees at SIEMENS and at a BASF service provider, in addition to Trivago and Booking.com. The most concerning trail, however, leads to Dublin, into one of the centers of the European tech industry.
www.spiegel.de/international/world/the-v...12-96c8-1101c5655236
> For years, Russia has been pursuing cyberwarfare. A team of journalists coordinated by DER SPIEGEL and including reporters from the Guardian, German broadcaster ZDF, Austrian daily Der Standard, the Danish broadcaster DR, the Tamedia Group in Switzerland, the Washington Post, the Süddeutsche Zeitung and Le Monde has analyzed internal documents from the Moscow-based IT company NTC Vulkan. The company works for the Russian military and secret service agencies, providing tools for their virtual attacks.
> For the first time, the Vulkan Files provide insight into Vladimir Putin's plans for cyber-warfare.
Metoda podjele dužnosti među redakcijama po svijetu za provjeru materijala dobivenog od anonimnog izvora podsjeća na Panama Files.