![]() Over 60,000 chat conversations, source code, and corporate papers were leaked, exposing a wealth of information about Conti’s targeted victims.įor two days, ContiLeaks revealed chat and forum conversations dating back several years, documents shared within the organization, and source codes. Following the statements, a Conti Ransomware group member, believed to be a Ukrainian supporter, began leaking Jabber instant messages belonging to the Conti group via the Twitter account. Conti Attack on Costa Rica’s SovereigntyĬonti, a ransomware gang that has been active in recent years, has had a taste of its own medicine and became the target of the act of releasing information.Ĭonti stated that they support Russia following Russia’s invasion of Ukraine. According to another claim, Ukraine’s intelligence services brought online the identities and contact information of 620 Russian agents registered in the Moscow office of the country’s leading security agency. Since late February, activists with the Distributed Denial of Secrets (DDoSecrets) group have published more than 700 gigabytes of material and more than 3 million Russian official emails and documents.įurthermore, personal information such as names, birthdays, and passport numbers of 1,600 Russian soldiers who served in the Russia-Ukraine war was made accessible. As a result of this activity, a considerable amount of information concerning Russian-related businesses and government institutions has been published. Ukraine’s digital government has likewise battled with disinformation.Īt the beginning of the conflict, the hacker group Anonymous declared a “cyber war” against the Russian government and claimed responsibility for attacks on Russian websites. Ukraine has organized a volunteer IT Army since the beginning of the war to defend and fight Russian websites and organizations that want to attack Ukraine and take its services offline. ![]() Since Russian troops crossed Ukraine’s borders at the end of February, a digital war has been going alongside the war. With the escalation of the Russia-Ukraine war, attacks on Russian organizations increased. Aside from this conflict, the potential risks that the people and families whom the Red Cross and Red Crescent network is attempting to protect and assist may face due to the misuse of their data is disturbing. Ĭonsequently, the ICRC was forced to shut down computer systems that support the Restoring Family Links program, which aims to reunite family members separated by conflict, disaster, or immigration. The attackers were not asked for a ransom. It was unclear who was behind the attack or why it was carried out. The attack is considered a targeted attack on the ICRC, as the attackers create code designed to be executed only on the respective ICRC servers. ![]() Those affected are missing persons and their families, detainees, and others who receive services from the Red Cross and Red Crescent Movement because of armed conflict, natural disasters, or migration. Personal data from at least 60 Red Cross and Red Crescent National Societies worldwide were compromised, including the names, locations, and contact information of over 515,000 people. ![]() ![]() It was discovered that attackers could gain access to the ICRC network and its systems by exploiting an unpatched critical vulnerability. Further investigation revealed that the attackers were inside these systems and had access to the data on them. The breach was discovered when the security company in charge of the ICRC systems noticed an anomaly in the ICRC servers containing information about the global Red Cross and Red Crescent Movement ‘s Restoring Family Links services. The International Committee of the Red Cross (ICRC) announced earlier this year that there had been a data breach. ![]()
0 Comments
Leave a Reply. |