Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Reuters
Reuters
Business
Pavel Polityuk

Exclusive - Ukraine says Russian hackers preparing massive strike

A view shows a laptop display showing part of a code, which is the component of Petya malware computer virus according to representatives of Ukrainian cyber security firm ISSP, at the firm's office in Kiev, Ukraine July 4, 2017. REUTERS/Valentyn Ogirenko

KIEV (Reuters) - Hackers from Russia are infecting Ukrainian companies with malicious software to create "back doors" for a large, coordinated attack, Ukraine's cyber police chief told Reuters on Tuesday.

The hackers are targeting companies, including banks and energy infrastructure firms, in a roll out that suggests they are preparing to activate the malware in one massive strike, cyber police chief Serhiy Demedyuk said. Ukrainian police are working with foreign authorities to identify the hackers, Demedyuk added.

Ukrainian Cyber Police Chief Serhiy Demedyuk speaks during an interview with Reuters in Kiev, Ukraine November 2, 2017. REUTERS/Valentyn Ogirenko

Law enforcement and corporate security teams around the world pay close attention to cyber threats in Ukraine, where some of the most destructive hacks in history have originated. A virus dubbed "NotPetya" hit Ukraine in June 2017, taking down government agencies and businesses before spreading to corporate networks around the globe, causing companies billions of dollars in losses.

"The fact that the Ukraine government has decided to go public with this shows that they are scared that this could have a big impact and want people to be aware," said Jaime Blasco, chief scientist with cybersecurity firm AlienVault.

It is difficult to contain the impact of a cyberattack within one nation, so it is possible this new threat could spread around the globe, he added.

A message demanding money is seen on a monitor of a payment terminal at a branch of Ukraine's state-owned bank Oschadbank after Ukrainian institutions were hit by cyber attacks, in Kiev, Ukraine June 27, 2017. REUTERS/Valentyn Ogirenko

Since the start of the year, Ukraine police have identified viruses in phishing emails sent from legitimate domains of state institutions whose systems were hacked and fake webpages mimicking that of a real state body.

Hackers have sought to evade detection by breaking malware into separate files, which are put onto targeted networks before they activate them, Demedyuk said.

"Analysis of the malicious software that has already been identified and the targeting of attacks on Ukraine suggest that this is all being done for a specific day," he said.

The logo of the Ukrainian Cyber Police is seen on a monitor at its headquarters in Kiev, Ukraine November 2, 2017. REUTERS/Valentyn Ogirenko

Relations between Ukraine and Russia plunged following Russia's annexation of Crimea in 2014, and Kiev has accused Russia of orchestrating large-scale cyberattacks as part of a "hybrid war" against Ukraine, which Moscow repeatedly denies.

Some attacks have coincided with major Ukrainian holidays. Demedyuk said another strike could be launched on Thursday -- Constitution Day -- or on Independence Day in August.

The United States and Britain joined Ukraine in blaming Russia for the NotPetya campaign in 2017. It took a costly toll on quarterly results of major global corporations including Cadbury chocolate maker Mondelez International Inc <MDLZ.O> and freight logistics company FedEx Corp <FDX.N>.

An employee shows, what he said is a part of malicious script used during a Bad Rabbit virus attack, on a computer screen at the Ukrainian Cyber Police headquarters in Kiev, Ukraine November 2, 2017. REUTERS/Valentyn Ogirenko

Representatives with the U.S. Federal Bureau of Investigation could not be reached for comment on Tuesday afternoon.

The scale of the current campaign is the same as NotPetya, according to Demedyuk.

"This is support on a government level - very expensive and very synchronized. Without the help of government bodies, it would not be possible. We're talking now about the Russian Federation," he said.

Ukrainian Cyber Police Chief Serhiy Demedyuk speaks during an interview with Reuters in Kiev, Ukraine November 2, 2017. REUTERS/Valentyn Ogirenko

"Everything we're seeing, everything we've intercepted in this period: 99 percent of the traces come from Russia."

The Kremlin did not respond to a request for comment.

Ukraine is better prepared to withstand such attacks thanks to cooperation with foreign allies including the United States, Britain and NATO, Demedyuk said.

Still, there are some Ukrainian companies that have not cleaned their computers after NotPetya struck, which means they are still infected by that virus and vulnerable to being used for another attack.

"We are sounding the alarm to remind people - come to your senses, check your equipment," he said.

(Reporting by Pavel Polityuk; Additional reporting by Angela Moon in New York and Margarita Popova in Moscow; Writing by Matthias Williams; Editing by Philippa Fletcher, Jim Finkle and Lisa Shumaker)

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.