In 2018 the State system of detection, prevention and elimination of consequences of computer attacks (Gossipy) has identified more than 4.3 billion attacks on critical information infrastructure of Russia, of whom over 25 million were spent on the online resources devoted to the 2018 world Cup. As noted by the Deputy Director of the FSB established the National coordination center for computer incidents, due to hacker attacks, which occurred during direct line with Vladimir Putin — 2017 and on the election day, is the intelligence Agency of a foreign state. Furthermore, it is known about the relations of the NSA of the US and NATO with the producers of malware.
Tuesday, 11 December, Moscow hosted a briefing by the National coordination center for computer incidents (NCCI). During the meeting, the Deputy Director of the center Nikolay Murashov stressed that the Russian Internet resources are subjected to heavy cyber attacks from abroad.
Recall that NCCI was established in September 2018 by order of the FSB Director Alexander Bortnikov after the service has determined the list of information which must be sent to the State detection system of prevention and liquidation of consequences of computer attacks (Gossipy).
“In 2018 means Goscope identified more than 4.3 billion of computer effects on Russian critical information infrastructure. Of these, more than 17 thousand of the most dangerous computer attacks,” said Murashov.
He noted that compared with 2017 the number of attacks has almost doubled — from 2.4 bn impacts and 12.3 thousand of the most dangerous attacks. Special attention was paid to the hackers held in Russia from 14 June to 15 July for the world Cup. Recall that during the world Cup, the FSB has prevented several terrorist attacks with the use of drones.
“On the information infrastructure of the world Cup, there were more than 25 million malicious influences,” explained the official.
In addition, the Deputy Director NCCCI told about foreign cyber attacks occurred in respect of the national segment of the Internet, the first peak of the attacks came in the “Direct line with Vladimir Putin — 2017” (June 15), the second — on the day of the presidential election in 2018 (March 18).
They were involved in a new modification of the malicious software family Russkill.
“Assessing inherent in this modification possible, we came to the conclusion that we are dealing with the secret service of a foreign state, in perfection knows the algorithms of DNS root servers”, — he said.
Commenting on attempts to iberostate for the presidential election, Murashov has added that the main target was the failure of the CCTV systems the voting process across the country, which would be a prerequisite for waging a campaign to discredit the final results. According to him, in 86 countries of the world operated a botnet of 30 thousand computers every day, each bot has generated 15 billion requests to DNS servers.
“In the West condone the creation of malware”
The representative NCCCI, referring to the statistics of the leading companies in the field of information security for the period of 2016-2017 years, said that the main source of malicious activities include the United States (49.6 per cent of the total number of attacks) and the European Union. At the same time, Washington and Brussels oppose Russian initiatives in the UN to ensure international information security.
“It is known that most of the giants of the industry of information and communication technologies are under the jurisdiction of the United States,” said Murashov.
According to him, numerous accusations of the West, including through the media, against Russia in the Commission of cyber attacks not supported by technical data.
“They actively fix in the public mind the idea that behind most of the attacks is Russia that our country is interfering in the political processes of other countries, including the impact on elective. While the accusations never confirmed reliable technical data that can be analyzed by experts,” — said the Deputy Director NCCCI.
The expert said that many Western countries, including the US, Britain and France, support the production of malicious software (SOFTWARE) and prevent the recognition of this criminal activity. This situation is due to the fact that “this multibillion-dollar business involved more than 40 major firms.”
“For example, the infamous French company Vupen, engaged in the sale of vulnerabilities. Her clients included the national security Agency (USA) and the intelligence agencies of other NATO countries”, — he stressed.
Subsequently, the founder of this company created a similar company in the United States — Zerodium. On the company’s website States the price tags of the vulnerability of different mobile devices. The most expensive are the insecurity of Apple products (up to $1.5 million), while clients have to pay up to $500 thousand for overcoming the weaknesses of the messenger Telegram, Viber, WhatsApp and IMessage.
Murashov said that getting this information to criminals has led to the emergence of viruses (WannaCry, NotPetya, BadRabbit) affecting nearly 70 countries around the world.
“I want to remind that us officials accused the Russian Federation in the spread of the virus NotPetya. Under this pretext, were disrupted by inter-Ministerial consultations between Russia and the United States, which was to be held in February 2018 in Geneva”, — he said.
Deputy NCCI expressed confidence in the need for international ban on the development of malware to increase the security of Internet users.
“Russia did. Article 273 of the criminal code qualifies the creation of malware as a crime. Alas, our example to follow, not many,” said Murashov.
Read more •••