‘Ukrainian Hackers Take Down Data Center Serving Russia’s Military Industry’

SBU - RussiaSources within the Security Service of Ukraine (SBU) told the Kyiv Independent today that Ukrainian hackers, who may have been related to the SBU, were responsible for the destruction of a data center that was utilized by the Russian military, energy, and telecommunications industries.

The sources claim that more than 10,000 organizations that are involved in the Russian military industry have kept their data on the data center infrastructure managed by cloud provider OwenCloud.ru.

On Telegram, the cloud provider wrote the following to its subscribers: “This morning we experienced an attack on the domain names owen.ru and owencloud.ru, which were replaced by a spoofed site. We are aware of the problem. We are working on fixing it and restoring access to the domain names. Thank you to everyone who is in favor of us…

Another message by the cloud provider on Telegram stated: “We continue to refine the scope of the attack we experienced this morning. Access to the owen.ru site has been restored. Work on the owencloud.ru service is ongoing. We will keep you informed. At the moment phones and e-mail are also NOT available. Orders are not being fulfilled, the service center is not working.”

Companies from Russia’s oil and gas production, metallurgical and aerospace industries, as well as significant telecommunications giants, such as Ural Works of Civil Aviation, Rubin, Ural Plant Spectechniks, Gazprom, Transgaz, Lukoil, Rosneft, Nornickel, and Rostelecom were allegedly among those who were affected by the incident.

‘Blackjack’ Hackers

Based on the information provided by Kyiv Independent’s sources, the operation was carried out in collaboration with the cybersecurity department of the SBU and the Ukrainian hacker organization known as Blackjack.

It has been reported by the sources that more than 300 gigabytes of data were eliminated. According to the sources, this consisted of a total of 400 virtual servers and 42 dedicated servers that were used to store internal documents, backup copies, and other programs that allowed clients to remotely supervise production at their own businesses.

Despite its best efforts, the Kyiv Independent was unable to independently verify the accusations. Read the full article here.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Spin.AI Launches Partner Program for its SaaS Cybersecurity Offering

Next Post

Cloudflare Enters Observability Market with Baselime Acquisition

Related Posts