Close Menu
    Facebook X (Twitter) Instagram
    Mediarun Search
    Facebook X (Twitter) Instagram
    Mediarun Search
    Home»Top News»The United States and the United Kingdom have blamed cyber-attacks on cloud infrastructure
    Top News

    The United States and the United Kingdom have blamed cyber-attacks on cloud infrastructure

    Morton ObrienBy Morton ObrienJuly 2, 2021No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    The United States and the United Kingdom have blamed cyber-attacks on cloud infrastructure
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The U.S. and UK security agencies have repeatedly blamed Russia for attacks on key parts of its infrastructure. This Thursday (1), the FBI and NSI launched a series of large-scale brutal attacks on Russian cyber military units using cloud systems used by businesses and government agencies around the world.

    The reported attacks have been linked to a group of cybercriminals identified as APT28 or Fancy Bear. The report is signed by the US Cyber ​​Security and Infrastructure Security Agency (CISA) and the UK Cyber ​​Security Center (NCSC); And says the attacks have been ongoing since mid-2019 and continue until now.

    Image: Screen Capture / Canaltech

    Intelligence agencies claim to have created Division 26165 of the 85th Specialized Service Center (GDSS) of the Russian Directorate General of Public Service Intelligence (GRU) Masonry From Kubernetes To make access attempts based on the use of rogue power. One of its main targets is the cloud services provided by Microsoft Office 365, including email.

    One Masonry De Cubernetis is a set of nodes that run applications in containers with lighter, more flexible work packages than virtual machines, allowing easy, remote development and management from anywhere without the specific use of an operating system in multiple digital environments.

    According to the report, Fancy Bear uses compromised machines to gain internal access to email servers. From there, they make lateral moves to take complete control of the networks and create them using stolen valid evidence. Doors It ensures permanent access to them.

    The group tried to cover up their attacks

    The group’s attacks were under the radar disguised by the TOR network and by VPN services such as Cactusvipn, iBivanish, Nordivipn, Protonvipn, Surpshark and Worldvipn. Cybercriminals also use protocols such as HTTP (S), IMAP (S), POP3, and NTLM to diversify their attack methods and help avoid potential investigations. Brutal attacks also had gaps, making it difficult to find a pattern.

    See also  Portuguese in the UK are frustrated by online appointments at consulates
    Image: Screen Capture / Canaltech

    Rob Joyce, NSA’s director of cyber security, warns that “this long-running, ruthless campaign to collect and dispose of data, login credentials, and more is ongoing worldwide. “Network lawyers should use multifactor recognition and additional mitigation to combat this practice,” he said.

    In the public document, Agencies have released some of the IP addresses used by Fancy Bear in its attacks so that companies can protect themselves. Key targets include government and military agencies, security solutions companies, energy companies, law firms, media groups and higher education institutions.

    Source: Press

    Did you like this article?

    Subscribe to your email at Canaltech to receive daily updates with the latest news from the tech world.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Morton Obrien

    "Reader. Infuriatingly humble travel enthusiast. Extreme food scholar. Writer. Communicator."

    Related Posts

    Acrylic Nails and the Art of Self-Expression: What Your Manicure Says About You

    October 30, 2025

    UK May Face Widespread Bankruptcy of Bible Colleges – Communion

    October 27, 2025

    Automated Small Claims Process: How Technology is Changing Legal Services

    October 1, 2025
    Leave A Reply Cancel Reply

    Navigate
    • Home
    • Top News
    • World
    • Economy
    • science
    • Technology
    • sport
    • entertainment
    • Contact Form
    Pages
    • About Us
    • Privacy Policy
    • DMCA
    • Editorial Policy
    • Contact Form
    MAIN MENU
    • Home
    • Top News
    • World
    • Economy
    • science
    • Technology
    • sport
    • entertainment
    • Contact Form
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.