Just another WordPress site Hacking Russia,Podcast,White Hack Hacking PODCAST #1 – HOW TO HACK RUSSIA “IN THEORY”

PODCAST #1 – HOW TO HACK RUSSIA “IN THEORY”

PODCAST #1 – HOW TO HACK RUSSIA “IN THEORY” post thumbnail image

In our first Cyber Podcast we will kick it off on a hot topic – Russian aggression and how the world could actually be hacking all their infrastructure instead in theory 🙂 I get asked a lot about who the perpetrators are and the easiest unclassified way to explain it can be found on Mitre’s website. The Military arm of the APT hacking groups is open source defined by Mitre.org as:

APT28 is a threat group that has been attributed to Russia’s General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.[1][2] This group has been active since at least 2004.

APT28 reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. [5] In 2018, the US indicted five GRU Unit 26165 officers associated with APT28 for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.[14] Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as Sandworm Team.

and the next well known:

APT29 is threat group that has been attributed to Russia’s Foreign Intelligence Service (SVR).[1][2] They have operated since at least 2008, often targeting government networks in Europe and NATO member countries, research institutes, and think tanks. APT29 reportedly compromised the Democratic National Committee starting in the summer of 2015.[3][4][5][6]

In April 2021, the US and UK governments attributed the SolarWinds supply chain compromise cyber operation to the SVR; public statements included citations to APT29, Cozy Bear, and The Dukes.[7][8] Victims of this campaign included government, consulting, technology, telecom, and other organizations in North America, Europe, Asia, and the Middle East. Industry reporting referred to the actors involved in this campaign as UNC2452, NOBELIUM, StellarParticle, and Dark Halo.

And always let us know what you would like to hear or learn about in the cyber world and we can add it to future topic lists

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Post