“Russian Hackers Accessed Ukraine’s Largest Telecom Company for Months, Report Reveals”

In a recent revelation that sent shockwaves through Ukraine and beyond, the Security Service of Ukraine (SBU) disclosed exclusive details of a relentless cyberattack on Kyivstar, Ukraine’s largest telecoms operator. The breach, attributed to Russian hackers from the notorious Sandworm unit, unleashed significant disruptions, jeopardizing services for approximately 24 million users for several days in December.

The attack, one of the most impactful since Russia’s invasion nearly two years ago, reportedly began infiltrating Kyivstar’s systems as early as May the previous year. Illia Vitiuk, head of SBU’s cybersecurity department, highlighted the catastrophic nature of the breach, describing it as a groundbreaking example of a destructive cyber onslaught that ravaged the core infrastructure of a telecoms giant.

Vitiuk emphasized the attack’s multifaceted objectives, aiming to inflict psychological distress while harvesting intelligence. The intrusion resulted in extensive damage, wiping out vast portions of Kyivstar’s virtual servers and computers. The hackers’ access level posed severe risks, potentially enabling the theft of personal data, interception of SMS messages, and even the compromise of Telegram accounts.

Despite the colossal setback, Kyivstar collaborated closely with the SBU to swiftly restore operations and fortify defenses against subsequent cyber threats. Vitiuk acknowledged the cooperative efforts but noted the ongoing vulnerability, cautioning that the pattern of behavior suggested telecoms operators remained prime targets for Russian hackers.

The repercussions extended beyond disrupted services; with ATMs reliant on Kyivstar SIM cards ceasing to function and the malfunction of vital systems like air-raid sirens in some regions, impacting emergency response mechanisms. Despite the turmoil, Vitiuk reassured that the attack had minimal impact on Ukraine’s military operations, which employed distinct protocols not reliant on conventional telecoms infrastructure.

The investigation into the breach faced significant challenges due to the thorough wiping of Kyivstar’s infrastructure. Vitiuk pointed to the Sandworm unit of Russian military intelligence as the likely culprit, noting its history of cyberattacks within Ukraine and elsewhere. The SBU thwarted over 4,500 major cyberattacks on Ukrainian governmental bodies and critical infrastructure the previous year, underscoring the persistent threat.

While details surrounding the breach’s methodology remain under scrutiny, suspicions linger about potential internal assistance facilitating the breach. The recovered malware samples are undergoing rigorous analysis to shed light on the attack’s execution.

Kyivstar’s CEO, Oleksandr Komarov, confirmed full restoration of services by December 20, but concerns persist about future vulnerabilities. Vitiuk highlighted similarities between Kyivstar and Russian mobile operator Beeline, suggesting potential ease for hackers due to comparable infrastructure.

As Ukraine grapples with the aftermath, the incident serves as a stark warning to the broader Western world, emphasizing the need for heightened vigilance and robust cybersecurity measures in an era of escalating digital threats.

Sources By Agencies

Recent Articles

spot_img

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox

[tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]