6 Hackers Charged Over Global Cyberattacks

1516

  • Six members of the APT group known as Sandworm have been charged in the US over a series of attacks including the destructive NotPetya incident.
  • The indictment charges them with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name.
  • The US investigation was assisted by multiple partners, including the UK’s National Cyber Security Centre (NCSC), which provided vital intelligence on the Olympic cyber attacks.

The U.S. Department of Justice has charged six members of the Russian Main Intelligence Directorate (GRU) in connection with the June 2017 “NotPetya” cyberattack, reports Computer Weekly.

The notorious malware release led to prolonged shutdowns across the APM Terminals and Maersk Line business IT networks, among many other serious impacts worldwide.

NotPetya malware attack

On June 27, 2017, the destructive NotPetya malware attack hit critical infrastructure and government targets in Ukraine.

It then spread uncontrolled between corporate computer networks, affecting dozens of unrelated companies worldwide. Among other organizations, it impacted operations at Maersk, APMT, Fedex subsidiary TNT Express, and U.S. pharmaceutical company Merck.

The U.S.-based impacts on shoreside business came to nearly $1 billion, and the shutdown cost Maersk Group an estimated $300 million across its global maritime operations.

The Kremlin has previously denied any involvement in the attack, dismissing criticism as a “Russophobic campaign.”

No country has weaponized its cyber capabilities as maliciously or irresponsibly as Russia, wantonly causing unprecedented damage to pursue small tactical advantages and to satisfy fits of spite,” said Assistant Attorney General for National Security John C. Demers.

He added, “Today the department has charged these Russian officers with conducting the most disruptive and destructive series of computer attacks ever attributed to a single group, including by unleashing the NotPetya malware. No nation will recapture greatness while behaving in this way.”

Hackers charged

The GRU officers who allegedly developed NotPetya were named as Petr Nikolayevich Pliskin, Pavel Valeryevich Frolov, Sergey Vladimirovich Detistov and Yuriy Sergeyevich Andrienko. Two more individuals – Anatoliy Sergeyevich Kovalev and Artem Valeryevich Ochichenko – were charged in connection with unrelated hacking campaigns.

In addition to their activities related to NotPetya, the six officers were allegedly involved in hacking other foreign targets. These attacks included:

  • destructive malware attacks targeting Ukrainian utility companies and government agencies in 2015-16;
  • spearphishing and hack-and-leak operations targeting French politicians and government entities in the run-up to the 2017 French elections;
  • spearphishing and malicious app attacks against officials and participants in the PyeongChang 2018 Winter Olympics; and
  • a spearphishing campaign aimed at the investigation into Russian use of nerve agents on British soil in 2018.

Allegations faced

If arrested in the United States or extradited, each would face seven charges – conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers and aggravated identity theft. The maximum penalty for wire fraud is 20 years in jail.

The same GRU division – Unit 74455 (“Sandworm” or “Fancy Bear”) – allegedly contributed to the successful phishing attack on the Democratic National Committee and other electoral interference campaigns during the 2016 U.S. presidential election, according to cybersecurity consultancy CrowdStrike.

In 2018, Special Counsel Robert Mueller indicted 12 officers from Units 74455 and 26165 in connection with that campaign, including Anatoliy Sergeyevich Kovalev. Though the new charges released include allegations of interference in elections overseas, they do not reference this earlier activity.

Did you subscribe to our daily newsletter?

It’s Free! Click here to Subscribe!

Source: Computer Weekly