Russian intelligence making use of Brexit to hack targets


Phishing emails detected by the cyber security office of providers company Accenture are masquerading as Brexit negotiation files in order to dupe victims into downloading them.

In accordance to Accenture, the development of the destructive document on the same day that the British government introduced its first draft of the Brexit settlement suggests that the hackers are spending close attention to political affairs to build their lure paperwork.

Though Britain has earlier accused the GRU of a spate of cyber attacks, from an influence campaign focusing on the 2016 US elections to the leaking of best athletes’ healthcare information, the attacks do not show up to be halting.

The UK’s agreement with the EU was posted on 15 November, the similar day as the filename of the hacker’s destructive doc. The arrangement will be put to a parliamentary vote on 11 December.

There has been much speculation, concern and political manoeuvring in advance of this vote – which the GRU appears to be exploiting in order to persuade victims to download the malicious doc.

When victims opened the doc they would have observed it contained jumbled text which the hackers had designed, and a be aware encouraging the possible victims to permit macros.

By next the hackers’ guidelines, the sufferer would have allowed the document to load destructive content material controlled by the attackers – granting the GRU entry to their equipment.

There has under no circumstances been a community assessment in the British isles that Russia tried to interfere in the referendum in a way it has been accused of undertaking in the US presidential election.

Michael Yip, safety principal at Accenture Security’s iDefense office, explained to Sky Information that the team had concluded a whole lot of work tracking the GRU-related hackers.

Known internally as SNAKEMACKEREL, tracking the team permitted iDefense to attain the conclusion that the phishing marketing campaign was connected to the armed service intelligence directorate.

“Based mostly on the noticed concentrating on by this threat group in excess of the earlier several many years, we evaluate with reasonable self esteem that they are probably to have focused govt, politics, feel tanks, ministry of international affairs (MFAs) and defence organisations in the US, Europe and former eastern bloc,” Mr Yip mentioned.

Though Accenture could not affirm irrespective of whether the the vast majority of specific men and women were based in the Uk, Mr Yip mentioned that the hackers were being very likely to have obtained average-to-significant achievement with the phishing campaign.


log in

reset password

Back to
log in