Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025

WestJet Faces Cyberattack Disrupting Operations

June 14, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » US widens indictment of Russians in ‘WhisperGate’ conspiracy to destroy Ukrainian and NATO systems
Cybercrime

US widens indictment of Russians in ‘WhisperGate’ conspiracy to destroy Ukrainian and NATO systems

Staff WriterBy Staff WriterFebruary 15, 2025Updated:May 17, 2025No Comments4 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


BALTIMORE (AP) — The U.S. Justice Department has widened its indictment of Russians in the so-called WhisperGate malware attacks aimed at destroying computer systems in Ukraine and 26 NATO allies including the United States.

A superseding indictment announced Thursday names five Russian military intelligence officers in a conspiracy to demoralize the Ukrainian people on the eve of Russia’s full-scale invasion of Ukraine.

The WhisperGate attacks in January 2022 could be considered Russia’s first shot in the war, said William DelBagno, special agent in charge of the FBI’s Baltimore field office. The cyberattacks penetrated U.S. companies and targeted Ukraine’s civilian infrastructure and computer systems unrelated to defense, including the judiciary, emergency services, food safety and education, officials said.

“Seeking to sap the morale of the Ukrainian public, the defendants also stole and leaked the personal data of thousands of Ukrainian civilians, including by posting patient health information and other sensitive private data for sale online and then taunting those victims,” said Matthew Olsen, assistant attorney general for national security.

The attacks weren’t limited to Ukraine, Olsen said at the news conference in Baltimore, which also included Maryland U.S. Attorney Erek Barron.

Olsen said. “They went on to target computer systems in other nations supporting Ukraine in its fight for survival. Ultimately, their targets included computer systems in 26 NATO partners, including the United States.”

A federal grand jury in Baltimore indicted military intelligence officers Vladislav Borovkov, Denis Denisenko, Yury Denisov, Dmitry Goloshubov and Nikolai Korchagin along with Amin Timovich Stigal, a 22-year-old Russian civilian indicted in June. It accuses them of conspiring to gain unauthorized access to computers associated with the governments of Ukraine and its allies.

Combined, the U.S. government is offering $60 million in rewards for help leading to their locations or malicious cyberactivity. All six are most likely in Russia, but federal officials said the indictment is useful anyway, to prevent them from traveling and to show that the U.S. has exposed their conspiracy.

The U.S. investigation, Operation Toy Soldier, found the accused committed fraud in the U.S. by illegally accessing bank accounts and using a U.S. company to unwittingly carry out their crimes, DelBagno said.

“Adding insult to injury these individuals not only used tools to scan for vulnerabilities 63 times on a Maryland U.S.-based government agency, but they also scanned our allies throughout the world, including Ukrainian servers and servers in various other countries,” Barron said.

The FBI and government partners in other countries are issuing a joint cybersecurity advisory that details how the attacks were carried out and what can be done to prevent them, officials said.

Countering Russia’s cyber threat demands constant efforts, they said. In January, the Justice Department also disrupted a botnet controlled by Russian military intelligence that officials say was used to enable crimes and espionage, and in May, officials announced charges against the alleged developer of a prolific ransomware variant known as LockBit.

Other Russia-related prosecutions announced just this week include indictments unsealed Wednesday charging two employees of RT, a Russia state media company, with covertly funneling millions of dollars to a Tennessee-based content creation firm that paid social media influencers to publish videos in line with Russia’s interests, such as on topics like the war with Ukraine.

DelBagno said the indictments are the result of years of collaboration with partners and law enforcement in Europe.

“To the Russian criminals, the world is watching,” DelBagno said. “You do not carry out misdeeds in the dark. We are united in identifying, prosecuting and protecting against future crimes.”

In another move targeting Russia, the State Department on Thursday imposed sanctions against two Russian companies and two ships they own that export liquefied natural gas from a previously sanctioned Russian energy project in the Arctic. The department alleged that the companies were using profits from the natural gas exports to fund Russia’s war in Ukraine.

The department said it was designating the Gotik Energy Shipping Co. and the Plio Energy Cargo Shipping Co. along with their ships LNG New Energy and LNG Mulan for “supporting Russia’s war effort and attempting to expand Russia’s global energy leverage.” The sanctions freeze any assets the companies may have in U.S. jurisdictions and bar Americans from doing business with them.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleJustice Department disrupts vast Chinese hacking operation that infected consumer devices
Next Article What we know about suspected Iranian cyber intrusion in the US presidential race
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Protecting your 23andMe data against resale

June 11, 2025

Tanzania blocks access to X after it says hackers targeted government accounts

May 28, 2025

Dutch intelligence agencies say Russian hackers stole police data in cyberattack

May 28, 2025
Leave A Reply Cancel Reply

Latest Posts

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 20250 Views

WestJet Faces Cyberattack Disrupting Operations

June 14, 20250 Views

Outage Unrelated to Security: Your Data Remains Safe!

June 13, 20250 Views

Google Links Major Cloud Outage to API Management Glitch

June 13, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025

WestJet Faces Cyberattack Disrupting Operations

June 14, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.