×
Enjoying ad-free content?
Since July 1, 2024, we have disabled all ads to improve your reading experience.
This commitment costs us $10,000 a month. Your support can help us fill the gap.
Support us
Our journalism is banned in Russia. We need your help to keep providing you with the truth.

2nd Russian Hacker Group Accused of Targeting NATO

A U.S. security firm has claimed that a Russia-based hacker group is spying on NATO. Maxim Stulov / Vedomosti

A U.S. security firm has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government.

In a report issued Tuesday, security firm FireEye said the group, which the firm dubbed APT28, has since 2007 conducted “long-standing, focused operations that indicate a government sponsor — specifically, a government based in Moscow.”

“APT28 targets insider information related to governments, militaries and security organizations that would likely benefit the Russian government,” the report says. These targets include the Georgian Defense and Interior ministries, post-Soviet governments in Eastern Europe that are now members of NATO, and the NATO alliance itself.

Russian cyber espionage efforts have long been considered unrivaled in skill and scope, but the difficulty of identifying attacks and tracing them to an identifiable source has prevented cyber security investigators from pinning any activity directly on a single Russian entity.

But evidence of a wide-ranging cyber espionage campaign is mounting. Earlier in October, another U.S. cyber security firm said that a group of Russian hackers with suspected government backing had used a previously unknown backdoor in Microsoft Windows operating systems to spy on NATO and several Western governments.

APT28 does not appear to be stealing intellectual property or directly profiting from stolen financial information, as is characteristic of China-based actors tracked by FireEye, the report said. Instead, the hackers focus on defense and geopolitical intelligence-gathering.

The sophistication of APT28's malware indicates that the group is state-sponsored, the report said. Samples of the group's coding show that work on the group's cyber weapons corresponds to a normal working week in the St. Petersburg and Moscow time zone almost 90 percent of the time.

FireEye's report also mentions that the language settings on the coding are Russian, rather than English or language-neutral settings.

Contact the author at m.bodner@imedia.ru

A Message from The Moscow Times:

Dear readers,

We are facing unprecedented challenges. Russia's Prosecutor General's Office has designated The Moscow Times as an "undesirable" organization, criminalizing our work and putting our staff at risk of prosecution. This follows our earlier unjust labeling as a "foreign agent."

These actions are direct attempts to silence independent journalism in Russia. The authorities claim our work "discredits the decisions of the Russian leadership." We see things differently: we strive to provide accurate, unbiased reporting on Russia.

We, the journalists of The Moscow Times, refuse to be silenced. But to continue our work, we need your help.

Your support, no matter how small, makes a world of difference. If you can, please support us monthly starting from just $2. It's quick to set up, and every contribution makes a significant impact.

By supporting The Moscow Times, you're defending open, independent journalism in the face of repression. Thank you for standing with us.

Once
Monthly
Annual
Continue
paiment methods
Not ready to support today?
Remind me later.

Read more