UK exposes Russian cyber attacks
The UK National Cyber Security Centre has identified a campaign by the Russian military intelligence service of indiscriminate and reckless cyber attacks.
Today, the UK and its allies can expose a campaign by the GRU, the Russian military intelligence service, of indiscriminate and reckless cyber attacks targeting political institutions, businesses, media and sport.
The National Cyber Security Centre (NCSC) has identified that a number of cyber actors widely known to have been conducting cyber attacks around the world are, in fact, the GRU. These attacks have been conducted in flagrant violation of international law, have affected citizens in a large number of countries, including Russia, and have cost national economies millions of pounds.
Cyber attacks orchestrated by the GRU have attempted to undermine international sporting institution the World Anti-Doping Agency (WADA), disrupt transport systems in Ukraine, and destabilise democracies and target businesses.
This campaign by the GRU shows that it is working in secret to undermine international law and international institutions.
The Foreign Secretary, Jeremy Hunt said:
These cyber attacks serve no legitimate national security interest, instead impacting the ability of people around the world to go about their daily lives free from interference, and even their ability to enjoy sport.
The GRU’s actions are reckless and indiscriminate: they try to undermine and interfere in elections in other countries; they are even prepared to damage Russian companies and Russian citizens. This pattern of behaviour demonstrates their desire to operate without regard to international law or established norms and to do so with a feeling of impunity and without consequences.
Our message is clear: together with our allies, we will expose and respond to the GRU’s attempts to undermine international stability.
Today, the UK and its allies are once again united in demonstrating that the international community will stand up against irresponsible cyber attacks by other governments and that we will work together to respond to them. The British government will continue to do whatever is necessary to keep our people safe.
Notes to editors
As the Prime Minister said in Parliament on 5 September 2018, the UK will work with our allies to shine a light on the activities of the GRU and expose their methods.
The UK’s National Cyber Security Centre assess that the GRU is almost certainly responsible for the cyber activities listed below. Given the high confidence assessment and the broader context, the UK government has made the judgement that the Russian government – the Kremlin – was responsible.
The GRU are associated with the names:
- APT 28
- Fancy Bear
- Sofacy
- Pawnstorm
- Sednit
- CyberCaliphate
- Cyber Berkut
- Voodoo Bear
- BlackEnergy Actors
- STRONTIUM
- Tsar Team
- Sandworm
Attack | NSCS assessment |
---|---|
In October 2017, BadRabbit ransomware encrypted hard drives and rendered IT inoperable. This caused disruption including to the Kyiv metro, Odessa airport, Russia’s central bank and two Russian media outlets. | NCSC assess with high confidence that the GRU was almost certainly responsible. |
In August 2016, confidential medical files relating to a number of international athletes were released. WADA stated publicly that this data came from a hack of its Anti-Doping Administration and Management system. | NCSC assess with high confidence that the GRU was almost certainly responsible. |
In 2016, the Democratic National Committee (DNC) was hacked and documents were subsequently published online. | NCSC assess with high confidence that the GRU was almost certainly responsible. |
Between July and August 2015 multiple email accounts belonging to a small UK-based TV station were accessed and content stolen. | NCSC assess with high confidence that the GRU was almost certainly responsible. |
Previously attributed
Attack | NCSC assessment |
---|---|
In June 2017 a destructive cyber attack targeted the Ukrainian financial, energy and government sectors but spread further affecting other European and Russian businesses. | The UK government attributed this attack to the GRU in February 2018. NCSC assess with high confidence that the GRU was almost certainly responsible. |
In October 2017, VPNFILTER malware infected thousands of home and small business routers and network devices worldwide. The infection potentially allowed attackers to control infected devices, render them inoperable and intercept or block network traffic. | In April 2018, the NCSC, FBI and Department for Homeland Security issued a joint Technical Alert about this activity by Russian state-sponsored actors. |
Update at 1pm
This update follows the statement in The Netherlands on the attempted hacking of the OPCW by Russian military intelligence.
Attack | NCSC assessment |
---|---|
In May 2018 GRU hackers sent spearphishing emails which impersonated Swiss federal authorities to directly target OPCW employees, and thus OPCW computer systems. These employees were likely attending a forthcoming conference in Spiez. | NCSC assess with high confidence that the GRU were almost certainly responsible. |
In April 2018 the GRU attempted to use its cyber capabilities to gain access to official OPCW computer networks. | NCSC assess with high confidence that the GRU were almost certainly responsible. |
In April 2018 the GRU attempted to use its cyber capabilities to gain access to the UK Defence and Science Technology Laboratory (DSTL) computer systems. | NCSC assess with high confidence that the GRU were almost certainly responsible. |
In March 2018 the GRU attempted to compromise the UK Foreign and Commonwealth Office (FCO) computer systems via a spearphishing attack. | NCSC assess with high confidence that the GRU were almost certainly responsible. |
Newsdesk
- follow the Foreign Secretary on Twitter @Jeremy_Hunt
- follow the Foreign Office on Twitter @foreignoffice and Facebook
- follow the Foreign Office on Instagram, YouTube and LinkedIn
- subscribe to the announcements feed or email alerts to get our latest news and announcements
Updates to this page
Published 4 October 2018Last updated 4 October 2018 + show all updates
-
Updated with further details on other cyber attacks, following the statement in the Netherlands.
-
First published.