Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 5
83 résultats taggé ukraine  ✕
Call between POLITICO journalist and EU official was intercepted and published online https://www.politico.eu/article/politico-journalist-call-intercept-published-hacking-security-review-hungary-ukraine/
27/03/2026 08:01:57
QRCode
archive.org
thumbnail

politico.eu – POLITICO
March 25, 2026 1:48 am CET
By Zoya Sheftalovich

“Our internal reviews have found no evidence that any devices, networks or systems have been compromised,” POLITICO says in email to staff.

BRUSSELS ― POLITICO launched a security review after a private telephone conversation between one of its reporters and an EU official about issues connected to Hungary and Ukraine was apparently intercepted and the recording published online.

The nine-minute audio clip, from a call that took place on March 3, was uploaded to YouTube on March 16. It has been listened to 5,100 times, according to YouTube data.

“Our internal reviews have found no evidence that any devices, networks or systems have been compromised,” Kate Day, POLITICO’s senior executive editor in Europe, and Carrie Budoff Brown, POLITICO’s executive editor and executive vice president, said in an email to employees on Wednesday.

“We will not be intimidated by an apparent attempt to interfere with independent reporting — nor deterred from the important work we do,” they wrote. “We have always been and will remain vigilant in protecting our sources, supporting the work of our journalists, and maintaining the accuracy of our independent, nonpartisan reporting.”

The issue comes at a time when leaks of confidential EU information are in the spotlight ahead of the Hungarian general election on April 12. In a report on Saturday, the Washington Post said that Viktor Orbán’s government maintained close contacts with Moscow throughout the war in Ukraine, and Hungarian Foreign Minister Péter Szijjártó used breaks during meetings with other member countries to update his Russian counterpart.

A spokesperson for the EU institution where the official works declined to comment on “tapes produced by unknown and anonymous actors.” POLITICO is not identifying the EU official because the call wasn’t on the record.

POLITICO has not been able to determine how the recording may have been obtained and who was responsible for posting it to YouTube.

‘Chilling message’
Several Slovak and Hungarian news websites wrote articles about the recording and published partial transcripts.

“Hacking and the disclosure of journalists’ materials strike at the heart of press freedom and the protections we must be able to rely on as reporters,” said President of the International Press Association in Brussels Dafydd ab Iago. “This is illegal under Belgian law, and it sends a chilling message not only to journalists in Brussels but also to our sources here … The harder question is how to pursue those state actors, whether operating from within the EU or from a third country like Russia.”

On Monday, the Orbán-aligned Hungarian newspaper Mandiner — one of the first outlets that wrote about the conversation — published a separate exchange between independent Hungarian journalist Szabolcs Panyi and a contact. The material was received via a “mysterious email” from an individual identifying himself as “the fourth branch of power,” according to the article’s author.

“We have important stories to tell and work to do and remain focused on maintaining the rigor, independence and purpose that our audience expects from us,” Day and Budoff Brown said in their email.

politico.eu EN 2026 Ukraine Espionage Orbán Missions Drones Pipelines Data Elections Viktor Russia Playbook Security Hungary Services Oil Germany Spying Intelligence Media
FBI, CISA issue PSA on Russian intelligence campaign to target messaging apps https://cyberscoop.com/fbi-cisa-issue-psa-on-russian-intelligence-campaign-to-target-messaging-apps/
21/03/2026 11:08:33
QRCode
archive.org
thumbnail

| CyberScoop cyberscoop.com
By
Tim Starks

March 20, 2026

It echoes earlier alerts from the Netherlands and Germany, and is the latest to warn about targeting of Signal users and others.

Russian intelligence-affiliated hackers have gained access to thousands of users’ messaging apps with a global phishing campaign, the FBI and the Cybersecurity and Infrastructure Security Agency warned in a public service announcement on Friday.

The high-value targets they’re pursuing include current and former U.S. government officials, political figures, military personnel and journalists, the two agencies said in the joint PSA about the hackers’ attempts to infiltrate commercial messaging applications (CMAs).

The U.S. alert comes on the heels of an earlier warning from Dutch authorities, who said last week that Russian hackers were “engaged in a large-scale global attempt” to take over WhatsApp and Signal accounts. The Dutch warning likewise followed a similar warning from Germany in February.

The U.S. agencies emphasized that the hackers had not been able to bypass end-to-end encryption, instead manipulating users into giving up access. The scheme involves hackers posing as Signal help personnel, then inviting them to click a link or provide verification codes or account personal identification number.

“After compromising an account, malicious actors can view the victims’ messages and contact lists, send messages, and conduct additional phishing against other CMA accounts,” the PSA explains. “(Note: reporting shows that the threat actors specifically target Signal accounts but can apply similar methods against other CMAs).”

However, “CMA users who strengthen their personal cybersecurity and defend against social engineering attempts can reduce the risk of account compromise and limit the effectiveness of the threat actors’ current tactics, techniques, and procedures,” the agencies said.

The Russian campaign is just the latest to seek to bypass the protections commercial messaging apps offer. CISA in November warned about spyware targeting of messaging apps.

There sometimes has been a Russian intelligence nexus to the recent targeting. Google Threat Intelligence Group shined a spotlight last year on Russian attempts to target Signal users in Ukraine.

‘We anticipate the tactics and methods used to target Signal will grow in prevalence in the near-term and proliferate to additional threat actors and regions outside the Ukrainian theater of war,” the company said.

CISA FBI Netherlands phishing Russia signal Ukraine WhatsApp germany Google messaging apps
Over 700 computers and servers deactivated: HUR cyber corps attacked Russia's leading logistics company https://unn.ua/en/news/over-700-computers-and-servers-deactivated-hur-cyber-corps-attacked-russias-leading-logistics-company
13/12/2025 15:39:01
QRCode
archive.org
thumbnail

Kyiv • UNN - unn.ua | УНН
December 6 2025

On December 6, the HUR MOD Cyber Corps and BO Team attacked the Russian logistics company "Eltrans+". Over 700 computers and servers were deactivated, 165 terabytes of data were destroyed, and network equipment was disabled.

The GUR Cyber Corps attacked Russia's leading logistics company on the night of December 6 - more than 700 computers and servers were deactivated, 165 terabytes of critical data were destroyed or encrypted, UNN reports with reference to sources.

On the night of December 6, specialists from the Main Intelligence Directorate of the Ministry of Defense, together with the BO Team, launched a cyberattack on the information and communication infrastructure of the Eltrans + group of companies. As a result of the attack, more than 700 computers and servers were deactivated, more than a thousand company users were deleted, and 165 terabytes of critical data were destroyed or encrypted.

  • the source reported.

ccording to the UNN interlocutor, in addition, the access control system, video surveillance data storage and backup system were affected, network equipment along with the core of the data center was deactivated and disabled, declarations for all cargo were destroyed, and all company websites were "defaced", which now greet Russian users with the Day of the Armed Forces of Ukraine.

Let's add
"Eltrans+" is among the top 10 largest customs representatives and freight forwarders in Russia. More than 5,000 Russian small, medium and large businesses use the services of "Eltrans+".

The company carries out international and domestic transportation (road, sea, air, multimodal), warehouse storage, transportation of consolidated cargo, as well as full customs clearance of goods.

"Eltrans+" is engaged in the delivery of sanctioned goods, as well as various electronic components from China, which are used by the Russian military-industrial complex, the UNN interlocutor reported.

unn.ua EN 2025 Russia Ukraine Eltrans+ wiped Russia-Ukraine-war
Ukrainian intelligence crashes Russian occupation servers in Crimea https://newsukraine.rbc.ua/news/cyber-blast-in-crimea-ukrainian-intelligence-1753431641.html
28/07/2025 21:33:43
QRCode
archive.org
thumbnail

newsukraine.rbc.ua - Cyber specialists from Ukraine's Defense Intelligence (HUR) have carried out a large-scale special operation targeting the occupation authorities in Crimea.

According to a Ukrainian intelligence source speaking to RBC-Ukraine, the operation lasted several days.

A powerful DDoS attack effectively paralyzed the information systems and network infrastructure in Crimea.

While the Russian occupiers were scrambling to identify the cause of the government systems' failure, HUR cyber experts infiltrated the electronic accounts of the leadership of the occupation administration in temporarily occupied Crimea. They gained access to the following digital resources:

  • electronic document management system DIALOG,
  • systems SED and Delo,
  • accounting platforms 1C:Document Flow, Directum, and ATLAS.
    Over two days, 100 terabytes of documents belonging to the occupation authorities of the peninsula were downloaded.
newsukraine.rbc.ua EN 2025 Crimea Russia Ukraine intelligence Russia-Ukraine-war DDoS HUR
Hackers Disrupt Russia's Drone Weaponization Network https://fromcyberia.substack.com/p/hackers-disrupt-russias-drone-weaponization
09/07/2025 09:18:38
QRCode
archive.org

A volunteer-run network of service centers halts custom firmware updates for DJI drones following a cyber attack.

Can a cyber operation have an impact on drone warfare? Recent developments in Russia offer an example of how this can happen in a not-so-obvious way.

On Friday, a volunteer group Russian Hackers for the Front (“Русские Хакеры – Фронту”, RH) known for building a customized firmware for DJI drones reported a cyber attack that affected its servers and end-point devices (terminals). While recovering from the attack, RH instructed hundreds of service centers to stop using its terminals until further notice, thus pausing a wide operation of weaponizing commercial drones.

Although details are scanty, this is a rare publicly reported cyber attack that affects drones warfare and might have militarily significant consequences.

In this post I will summarize what is known about the attack and provide additional information about the impact and who might be behind it.

fromcyberia.substack.com EN 2025 Disrupt drones Russia Ukraine Russian-Hackers-for-the-Front
British Army and Royal Navy hit by cyberattacks from pro-Russian and pro-Palestinian hackers | The Standard https://www.standard.co.uk/news/uk/british-army-royal-navy-cyberattacks-pro-russia-palestine-hackers-b1221112.html?ref=metacurity.com
07/04/2025 21:07:56
QRCode
archive.org
thumbnail

The group, known as the Holy League, is said to be made up of around 90 hacktivist collectives united by opposition to Western liberal values

standard EN 2025 Russian Cyberattack Ukraine British GCHQ cyberattacks Holy-League
Guerre en Ukraine : trois années d’opérations informationnelles russes https://www.sgdsn.gouv.fr/publications/guerre-en-ukraine-trois-annees-doperations-informationnelles-russes
03/03/2025 11:22:46
QRCode
archive.org

Ce rapport présente sous la forme d’une synthèse les principaux modes opératoires informationnels observés depuis trois ans, dont la majeure partie est apparue en corollaire de la guerre d’agression menée par la Russie en Ukraine.

sgdsn.gouv.fr FR 2025 rapport opérations informationnelles Russie Ukraine
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger?hl=en
26/02/2025 11:06:58
QRCode
archive.org
thumbnail

Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia's intelligence services. While this emerging operational interest has likely been sparked by wartime demands to gain access to sensitive government and military communications in the context of Russia's re-invasion of Ukraine, we anticipate the tactics and methods used to target Signal will grow in prevalence in the near-term and proliferate to additional threat actors and regions outside the Ukrainian theater of war.

google EN Signal QRcode GTIG Russia Ukraine Messenger
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks https://www.trendmicro.com/en_us/research/25/a/cve-2025-0411-ukrainian-organizations-targeted.html
07/02/2025 15:36:35
QRCode
archive.org
thumbnail

The ZDI team offers an analysis of how CVE-2025-0411, a zero-day vulnerability in 7-Zip was actively exploited to target Ukrainian organizations through spear-phishing and homoglyph attacks.

trendmicro EN 2025 CVE-2025-0411 Ukraine zero-day 7-Zip Targeted Campaign
How Switzerland is caught up in Russia’s propaganda machine https://www.swissinfo.ch/eng/foreign-affairs/how-switzerland-is-caught-up-in-russias-propaganda-machine/88785511
03/02/2025 12:03:24
QRCode
archive.org
thumbnail

How Russian propaganda challenges Switzerland's neutrality, using disinformation to sway public opinion in the Ukraine war.

swissinfo EN 2025 Switzerland Russia propaganda Ukraine
Russian ISP confirms Ukrainian hackers "destroyed" its network https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/
09/01/2025 16:38:15
QRCode
archive.org
thumbnail

Russian internet service provider Nodex confirmed on Tuesday that its network was

bleepingcomputer EN 2024 Breach Hacktivism ISP Nodex Russia Ukraine Ukrainian-Cyber-Alliance
Russia's GRU possibly behind cyberattack on Ukraine's government, SBU says https://kyivindependent.com/gru-may-be-behind-cyberattack-on-ukraine/
27/12/2024 11:26:12
QRCode
archive.org
thumbnail

"All the Justice Ministry's data has been saved. Recovery is underway," Deputy PM and Justice Minister Olha Stefanishyna said.

kyivindependent EN 2024 GRU cyberattack Ukraine Justice Ministry Russia-Ukraine-war
Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday https://www.bloomberg.com/news/articles/2024-10-07/ukraine-claims-cyberattack-blocked-russian-state-tv-online-on-putin-s-birthday?embedded-checkout=true
08/10/2024 06:49:27
QRCode
archive.org
thumbnail

Ukrainian hackers carried out a cyberattack that took down online broadcasts of Russian state television and radio channels on Monday, according to an official in Kyiv with knowledge of the operation.
#A #Dmitry #Emerging #Europe #Infrastructure #Markets #Media #Peskov #Putin #Radio #Russia #Ukraine #Vladimir #business #cybersecni #cybersecurity #politics #technology

bloomberg EN 2024 Russia Russia-Ukraine-war cyberattack broadcasts Ukraine State-TV Putin
Ukraine bans official use of Telegram app over fears of Russian spying https://www.reuters.com/technology/cybersecurity/ukraine-bans-official-use-telegram-app-over-fears-russian-spying-2024-09-20/?user_email=9e19aa6ed986d20195d4113ba5a6a3e709c18e0549688aa9b20d5f2e8d0dec05&lctg=6596a37f125992f7eb0b5ac9
21/09/2024 17:14:25
QRCode
archive.org
  • Restrictions apply only to official devices, not personal phones
  • Telegram heavily used in Ukraine and Russia since 2022 invasion
  • Budanov: Issue of Telegram is a matter of national security
reuters EN 2024 Telegram ban Ukraine Russia-Ukraine-war
Ukrainian cyber specialists attack Russian airports, several flights delayed - source https://www.ukrinform.net/rubric-ato/3874176-ukrainian-cyber-specialists-attack-russian-airports-several-flights-delayed-source.html?ref=news.risky.biz
14/06/2024 15:21:22
QRCode
archive.org
thumbnail

Specialists with the Ukrainian Defense Ministry's Main Intelligence Directorate (HUR) carried out a cyberattack on the websites of Russian government agencies and Russian airports on "Russia Day," with a number of flights being delayed. — Ukrinform.

ukrinform EN 2024 HUR Russia-Ukraine-war cyberattack airports Ukraine
Switzerland notes increase in cyberattacks ahead of Ukraine peace summit https://therecord.media/ukraine-peace-summit-switzerland-cyberattacks-warning
11/06/2024 16:21:23
QRCode
archive.org
thumbnail

Russia, which hasn’t been invited to the summit, has repeatedly called it “meaningless and harmful.” Swiss officials did not provide more details about the reported cyberattacks.

therecord.media EN 2024 cyberattacks Ukraine Switzerland Russia-Ukraine-war
Menace Unleashed: Excel File Deploys Cobalt Strike at Ukraine | Fortinet Blog https://www.fortinet.com/blog/threat-research/menace-unleashed-excel-file-deploys-cobalt-strike-at-ukraine
09/06/2024 16:31:33
QRCode
archive.org
thumbnail

FortiGuard Labs has recently identified a sophisticated cyberattack involving an Excel file embedded with a VBA macro designed to deploy a DLL file. Learn more.

fortinet EN 2024 excel FortiGuard-Labs-Threat-Research ukraine Cobalt-Strike
Hackers phish finance orgs using trojanized Minesweeper clone https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/
01/06/2024 13:47:13
QRCode
archive.org
thumbnail

Hackers are utilizing code from a Python clone of Microsoft's venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations.

bleepingcomputer EN 2024 Minesweeper RAT Remote-Access Remote-Access-Trojan Ukraine
Russia Steps Up a Covert Sabotage Campaign Aimed at Europe https://www.nytimes.com/2024/05/26/us/politics/russia-sabotage-campaign-ukraine.html
26/05/2024 13:33:39
QRCode
archive.org

Russian military intelligence, the G.R.U., is behind arson attacks aimed at undermining support for Ukraine’s war effort, security officials say.

nytimes EN 2024 Russia Ukraine EU Arson Vandalism Sabotage 2022 Russian NATO England Politics G.R.U US Europe Estonia GRU Russia-Ukraine-war
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities | WIRED https://www.wired.com/story/cyber-army-of-russia-reborn-sandworm-us-cyberattacks/
18/04/2024 07:08:54
QRCode
archive.org
thumbnail

Cyber Army of Russia Reborn, a group with ties to the Kremlin’s Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn’t dare to.

wired EN 2024 infrastructure hackers russia critical cyberwar cyberattacks ukraine
page 1 / 5
5036 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn