Categories: Technology

7 disturbing facts about Putin’s cyber-warriors – and what the leak means for Switzerland

The documents about Russian cyberweapons and attack plans leaked by an unknown whistleblower provide an in-depth insight. The reactions to the unprecedented leak, too.
Daniel Schurter

Thousands of pages of classified documents show how Russia plans and prepares cyber attacks around the world. A research network revealed this on Thursday.

Not only are the reports about the attack instruments commissioned by the Russian army disturbing, but also their origin. Developers and technicians from private IT firm NTC Vulkan have helped prepare Russian hacking operations abroad and train agents to attack critical infrastructure.

And that brings us to the main conclusions we draw from the “Vulkan Files” and the responses to them.

1. The lead developer of Russian cyberweapons now works at Amazon

The journalists doing research for the news magazine “Spiegel” call him Sergei N. and ask:

“What does a Russian cyber warfare specialist do in a company that houses large parts of the IT of hundreds of global companies, whose infrastructure is a mainstay of the global internet? Couldn’t or didn’t want AWS to know what N. used to do? As of June 2019 can be found in a leaked document [von NTV Vulkan] Comments signed with his name. By that time, he says he was already working for AWS.”

AWS stands for Amazon Web Services – a world leader in cloud computing. The Amazon subsidiary operates data centers around the world and its clients also include the Swiss Confederation.

At the request of the Spiegel, AWS only said that the security of customer data is the top priority.

2. The danger posed by the West cannot be estimated

According to reports, AWS hired the senior Vulkan employee in 2018, four years before the invasion of Ukraine. At that time, many HR managers in Western organizations apparently still thought that it would not be a problem to employ Russian IT specialists.

It should be noted that there were some business ties between NTC Vulkan and US companies. According to their website, several major manufacturers, including IBM, Boeing, and Dell, work with Vulkan.

It concerned commercial software development, without clear connections to secret services and hacking operations. And meanwhile, business relationships would no longer be maintained.

It is also not really reassuring that Vulkan has been active for a very long time, according to the research. According to a ZDF report, Google confirmed that a Vulkan email address was identified in 2012 in connection with malware from the Russian hacker group “Cozy Bear”.

“Russia is in our nets.”

4. No one in the West wants to talk about this security risk

“As of 2011, NTC Vulkan was granted special government permits to work on classified military projects and state secrets.”

Until the Russian invasion in February 2022, Vulkan employees openly traveled to Western Europe and attended international IT and cybersecurity conferences, the Guardian writes. Today, former employees live in Germany, Ireland and other EU countries. Some work for global technology companies. And it’s unclear whether Western counterintelligence agencies are watching them.

Investigative journalist Andrei soldatov asks:

“Is it safe or ethical to hire a Russian engineer with a background in information security, which in Moscow often means working for a company like NTC Vulkan?”

Even if someone leaves Russia and takes his immediate family with him, he still has friends and relatives at home, which makes him vulnerable.

However, the journalist, who lives in exile in London, also thinks it is not fair to send IT engineers back to Russia because of their previous jobs. Because these people would have had little choice. The Kremlin views such engineers as pawns whose job it is to support Russia’s war effort.

3. Russia no longer distinguishes between war and peace

Russian investigative journalist Andrei Soldatov, who fled to Britain, was able to see the secret documents stolen by the whistleblower. And concludes that the Russian army has adopted the aggressive mentality of Putin’s secret police.

“The leaked files also suggest that the Russian military long ago lifted restrictions on Soviet-era offensive weapons, which can only be used in wartime. The boundaries between war and peace are not just fluid in Russia, they don’t exist.”

The leaked documents intensified cooperation between the Russian military and the secret services. Soldierov estimates that Putin’s “siloviki”—senior intelligence and military officials—have become much more aggressive since the collapse of the Soviet Union.

5. That the cyberweapons themselves have not leaked is not good news

The documents leaked by the unknown whistleblower do not contain any concrete information about Russian malicious programs (malware) or other tools used for hacking operations.

“Because of what is happening in Ukraine, I have decided to make this information public.”

The unknown person sent several thousand documents, “PDFs, Word files, contracts, drafts, licenses, emails” via an encrypted platform only to disappear without a trace a few weeks later.

Why did the anonymous source fail to provide the journalists with program code or other technical details about Russian cyber weapons?

Because she didn’t have access to the digital weapons arsenal? Because she couldn’t do it without revealing herself, or because she didn’t want to reveal everything to the Western media? Or has the person been caught?

In any case, German security politician Konstantin von Notz, chairman of the parliamentary supervisory body responsible for the secret services, assumes that “hundreds of such cyberweapons” are currently being developed. And these pose a significant security risk.

In memory of: In 2016, a previously unknown group, the Shadow Brokers, announced that it had acquired previously unknown US cyberweapons. That came from the NSA’s elite Tailored Access Operations (TAO) unit.

In 2017, more NSA attack tools were released on the internet. Russian elite hackers – believed to be from the “Sandworm” group of Russian military intelligence – used them for the NotPetya malware attack with devastating consequences worldwide.

An investigation revealed that a third-party IT specialist working on behalf of the NSA and other US government agencies stole more than 50 terabytes of “highly sensitive data”, including the NSA’s dangerous hacking tools based on zero-day exploits.

Even Russian program code can fall into the wrong hands. Are the associated cyber weapons still safe and which internal and external persons had access?

6. Russia fights its enemies (including Switzerland) by all means

“There may also have been attacks on Switzerland that may not have been recognized before.”

One thing is certain: the latest revelations about NTC Vulkan are just the tip of the iceberg. The Russian IT company that was pilloried belongs to an extreme – even after the leak opaque military-industrial complex: More than 40 companies are closely intertwined through cooperation with the Russian secret services.

The aim of the public-private partnership is to develop highly effective cyberweapons “to target those whom the rulers of Moscow have declared enemies”.

John Hultquist, vice president of intelligence analysis at cybersecurity firm Mandiantwho was able to evaluate part of the «Vulkan files» says:

“These documents suggest that Russia views attacks on critical civilian infrastructure and social media manipulation as one and the same mission that is essentially an attack on the enemy’s will to fight.”

7. The latest revelations are disturbing – and change nothing

Are those responsible in politics, administration and the private sector aware of the dangers? And what exactly is being done against the threat from Russia?

The Federal Intelligence Service (NDB) made an evasive statement to the “Tages-Anzeiger”:

“In principle, all critical infrastructures can become a potential target of cyber attacks, namely when vulnerabilities are exploited for espionage, sabotage and crime.”

Until now, public interest in the discovered Russian war plans and cyber weapons has been relatively low. National politics seems to have overslept the subject. In any case, there were remarkably few tweets from security politicians about the #VulkanFiles.

Since the politically responsible and those responsible for IT security keep themselves in the background anyway and the intelligence services are also silent, we must inevitably be surprised at what awaits us.

Sources

  • mirror.de: These are Putin’s secret plans for cyberwar (subscription required)
  • theguardian.com: Cyber ​​war leaks show Russian military adopting secret police mentality
  • theguardian.com: Vulkan Files Leak Reveals Putin’s Global and Domestic Cyber ​​Warfare Tactics
  • washingtonpost.com: Secret Trove offers a rare glimpse into Russia’s cyberwar aspirations
  • zdf.de: “Vulkan Files”: Russia Plans Cyber ​​War
  • tags-anzeiger.ch: “This is the architecture of Russia’s new cyberwar”
  • zdf.de: “Vulkan Files”: Russia Plans Cyber ​​War

Daniel Schurter

Source: Watson

Share
Published by
Ella

Recent Posts

Terror suspect Chechen ‘hanged himself’ in Russian custody Egyptian President al-Sisi has been sworn in for a third term

On the same day of the terrorist attack on the Krokus City Hall in Moscow,…

1 year ago

Locals demand tourist tax for Tenerife: “Like a cancer consuming the island”

class="sc-cffd1e67-0 iQNQmc">1/4Residents of Tenerife have had enough of noisy and dirty tourists.It's too loud, the…

1 year ago

Agreement reached: this is how much Tuchel will receive for his departure from Bayern

class="sc-cffd1e67-0 iQNQmc">1/7Packing his things in Munich in the summer: Thomas Tuchel.After just over a year,…

1 year ago

Worst earthquake in 25 years in Taiwan +++ Number of deaths increased Is Russia running out of tanks? Now ‘Chinese coffins’ are used

At least seven people have been killed and 57 injured in severe earthquakes in the…

1 year ago

Now the moon should also have its own time (and its own clocks). These 11 photos and videos show just how intense the Taiwan earthquake was

The American space agency NASA would establish a uniform lunar time on behalf of the…

1 year ago

This is how the Swiss experienced the earthquake in Taiwan: “I saw a crack in the wall”

class="sc-cffd1e67-0 iQNQmc">1/8Bode Obwegeser was surprised by the earthquake while he was sleeping. “It was a…

1 year ago