"Ukraine Says It Thwarted Attempt to Breach Military Tablets"

The SBU, Ukraine's security service, thwarted a Russian state-controlled hacking group's attempt to break into the Ukrainian military's battlefield management system. A recently published technical report reveals that Russian hackers attempted to infect Ukrainian military networks with at least seven variants of new custom malware. The SBU attributed the attack to the hacking group known as Sandworm, which works on behalf of Russia's military intelligence agency. The security service reported that it was able to halt the operation during the planning phase. Sandworm has been persistently targeting Ukraine with various malware strains designed to disrupt critical networks. However, its latest attack aimed to gain access to sensitive information regarding the Ukrainian military's operations, locations, equipment, and movements. According to the SBU's report, the Russian hackers initially sought to seize Android tablets used by the Ukrainian military to plan and execute combat missions. They wanted to access other connected devices and infect them with malware through these tablets. The hackers have developed at least seven new information-stealing malware strains to infect Android devices, including NETD to conduct internal intelligence, TOR and DROPBEAR to gain remote access to the devices, and DEBLIND to steal information from Android devices. STL, another malware strain, can access devices connected to Starlink satellite Internet. This article continues to discuss Sandworm's attempt to infiltrate the Ukrainian military's battlefield management system.

The Record reports "Ukraine Says It Thwarted Attempt to Breach Military Tablets"

Submitted by Anonymous on