ESET cybersecurity experts: The lure was a spearphishing campaign, masquerading as a recruiter for Meta, via LinkedIn Messaging and 2 coding challenges.
The BIS: Czech security forces busted a Russian cyber espionage network, that operated from Moscow embassy in Prague. The efforts involve other European countries
Czech security forces and intelligence uncovered a Russian cyber espionage network, operating through the Moscow embassy in Prague. It was allegedly set up to attack local and foreign targets through computer servers. Michal Koudelka, head of the Czech Republic’s BIS intelligence service, explained in a parliament hearing that “the network was completely destroyed and decimated,” according to CTK news agency. He also added that the efforts were born in Russia and involve other European countries. “It was created by people with links to Russian intelligence services and financed from Russia and the Russian embassy,” he added. The cyber warfare operation could be the following of a cyber attack against local foreign ministry, that happened in last June. In August, the Denik N daily said Russian military intelligence (GRU) was most probably behind it.
The NUKIB: Russia and China pose the biggest threat to cyber security in the country. Moreover, one of the APT responsible for cyber espionage attack is Turla. The group the group that used Iranian tools and computer infrastructure to hack organisations, in a big false flag Op.
The foiled cyber espionage operation confirms what Czech intelligence agency NUKIB said on September. According to the 007, Russia and China pose the biggest threat to cyber security in the country. In its report for 2017, the NUKIB warned Russian and Chinese diplomats had stepped up their spying activities on Czech soil and Beijing was accused to be behind a major cyber attack on a key government institution in the Czech Republic last year. Furthermore, Prague government and intelligence accuse the Turla APT of operating on behalf of Russia’s FSB security service. Moreover, this is the group that used Iranian tools and computer infrastructure to hack organisations in at least 20 different countries over the last 18 months, as a US and UK joint prove revealed, in one of the biggest “false flag” operations.