• Hacker Services in Russia

    Защита от взлома вашей почты, мессенджеров, социальных сетей и конфиденциальной информации Услуги взлома

     

    While Russian law enforcement occasionally mounts operations against domestic hackers, they typically turn a blind eye to foreign infiltrators. There are not enough victims to support a criminal case against a foreign hacker, and Russia's law enforcement authorities simply don't have the resources to pursue foreign infiltrators. But there are ways to detect and prevent foreign hackers. Let's explore some of the most common hacking methods in Russia.

     

    Earlier this year, the Russian MVD and Department K (Investigation Department) arrested six hackers, who were selling stolen credit cards and personal information online. Russian authorities also suppressed other hacking groups, including those using Remote Desktop Protocol (RDP) to access servers. Russian authorities focused on major dark-web fraud shops, such as UniCC, Trump's Dumps, Ferum Shop, and Sky-Fraud.

     

    The hacker group Anonymous has been targeting Russian IT infrastructure for months. They have attacked government websites, online video streaming platforms, and State-run TV channels. In addition, they have hacked several hundred surveillance cameras across Russia, putting up messages against President Putin and pro-Ukraine protesters. While these attacks have heightened the level of international scrutiny, they are far from over. Nevertheless, the hacking activity has only fueled the Russian government's intelligence-collection efforts.

     

    In Russia, hackers have adapted their methods to increase their profit margins. They have adopted malware-as-a-service models to provide their services. These companies maintain command and control infrastructure, and sell access to their malware to affiliates. For example, the SCully Spider botnet operates the DanaBot botnet. DanaBot, which originated as a banking Trojan, was expanded to other malware in 2021. DanaBot also served as the initial access vector to other malware, including ransomware. In Ukraine, SCULLY SPIDER has been involved in several DDoS attacks.

     

    The Russian government has also been accused of hiring hackers to attack critical infrastructure outside the United States. In the recent case of United States v. Evgeny Viktorovich Gladkikh, a federal grand jury found him guilty of collaborating with other Russian nationals to hack two critical infrastructure entities outside of the United States. A federal grand jury indictment against him and eight other Russian nationals accused him of using hacker services to cause physical damage.

     

    Cyber operations conducted by Russian state-backed hackers in Ukraine have largely targeted government agencies, utility companies, and communication infrastructure. Mostly, these attacks have used destructive malware to erase data and disrupt operations for critical infrastructure companies. However, there have also been some instances of hack-and-leak tactics. But the recent incidents prove that Russia still has offensive cyber capabilities. It is a myth that Russia is unable to be stopped. In fact, the Russian government is a key player in these cyber attacks.