• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

You are here: Home / Cybercrime / U.K. and U.S. States Russia Responsible for NotPetya

U.K. and U.S. States Russia Responsible for NotPetya

February 16, 2018 By News Team Leave a Comment

The U.K. government, backed by an assessment made by its National Cyber Security Centre, stated yesterday that the Russian military was “almost certainly” responsible for the June 2017 NotPetya cyber attacks, mainly aimed at the Ukraine. The White House backed up the U.K.’s claim, saying that the NotPetya ransomware attack led to over a billion dollars’ worth of damage across Europe, Asia and the Americas.

Around 2,000 NotPetya related attacks were launched last summer against primary targets of the financial, energy and government sectors in the Ukraine; and spread to secondary targets of businesses with strong trade links with Ukraine. These included Danish shipping giant Maersk, British Reckitt Benckister, and Dutch delivery firm TNT. The indiscriminate design of the NotPetya virus caused it to spread more widely and affect the operations of other European and Russian businesses.

The U.K. said it believed the attacks were part of the long-standing conflict between Russia and the Ukraine since Moscow annexed Crimea in 2014. Lord Tariq Ahmad, Minister of State for the Commonwealth and the UN at the Foreign and Comonwealth Office said the attack displayed a continued disregard for Ukranian sovereignty.

“The NotPetya attack saw a malicious data encryption tool inserted into a legitimate a piece of software used by most of Ukraine’s financial and government institutions,” the NCSC noted. “The malware was not designed to be decrypted. This meant that there was no means for victims to recover data once it had been encrypted. Therefore, it is more accurate to describe this attack as destructive than as ransomware.” The NCSC added, “Several indicators seen by the NCSC demonstrated a high level of planning, research, and technical capability.”

U.K. Defense Secretary Gavin Williamson took the unusual step of making a public accusation against a foreign state for a cyberattack, and said the U.K. would respond to the fact that Russia was “ripping up the rule book”. A statement from the White House followed, saying, “In June 2017, the Russian military launched the most destructive and costly cyber attack in history. This was also a reckless and indiscriminate cyber attack that will be met with international consequences.”

Russia dismissed the claims as “groundless”, pointing to the fact that Russian businesses were also victims of the NotPetya attacks. “It’s not more than a continuation of the Russophobic campaign,” Kremlin spokesman Dmitry Peskov said.

Filed Under: Cybercrime, Government, Ransomware Tagged With: Maersk, NCSC, NotPetya, ransomware, Reckitt Benckister, Russia, TNT, U.K., U.S., Ukraine

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.