The Security Assistance of Ukraine (SBU) explained it has detained a “hacker” who made available specialized help to the invading Russian troops by offering cell communication solutions within the Ukrainian territory.
The nameless suspect is said to have broadcasted textual content messages to Ukrainian officers, which includes security officers and civil servants, proposing that they surrender and acquire the facet of Russia. The specific has also been accused of routing phone calls from Russia to the cellular phones of Russian troops in Ukraine.
“Up to a thousand calls were being created via this hacker in a person day. Numerous of them are from the prime management of the enemy military,” the SBU alleged, introducing it confiscated the products that was applied to pull off the operation.
Apart from implicating the hacker for aiding Russia make nameless phone calls to its armed forces forces based in Ukraine, the company stated the hacker handed commands and instructions to different teams of “Russian invaders.”
“He will be held accountable for all the severity of the legislation. Because on it is the blood of tens or even hundreds of killed Ukrainians,” read through the translation of the announcement.
Information of the detainment will come as a 3rd pressure of info-wiping malware dubbed “CaddyWiper” has been noticed in attacks versus a number of dozen programs in a minimal number of companies in Ukraine, shut on the heels of HermeticWiper and IsaacWiper coinciding with Russia’s invasion of Ukraine final thirty day period.
In a separate incident, Reuters previous week reported of a cyber attack that disrupted broadband satellite internet accessibility in Ukraine on February 24 in between 5 a.m. and 9 a.m. EET, ideal about the time Russia commenced its full-scale invasion of the state. The electronic sabotage crippled satellite modems that are section of Viasat’s KA-SAT network.
Discovered this report exciting? Follow THN on Fb, Twitter and LinkedIn to examine additional exclusive content material we publish.
Some parts of this article are sourced from:
thehackernews.com