Published 20:08 IST, July 16th 2020
UK accuses Russian intelligence services of trying to steal coronavirus vaccine research
The UK cybersecurity agency said that the US’ National Security Agency (NSA) has also agreed with the attribution and the details provided in the report.
Advertisement
Days after Russia anunced successful completion of a COVID-19 vaccine candidate trials on volunteers, UK has accused Russian hackers of trying to steal coronavirus vaccine research. National Cyber Security Centre (NCSC) published an visory on July 16, detailing tactics and techniques of a hacker group commonly kwn as ‘APT29’, also kwn as ‘ Dukes’ or ‘Cozy Bear’.
British government said that experts as NCSC are almost certain that APT29, which has targeted medical research and development organisations, is a part of Russian Intelligence Services. According to NCSC assessment, coordinated with Cana’s Communications Security Establishment (CSE), it is highly likely that this activity was to collect information on COVID-19 vaccine research or research into vel coronavirus itself.
Advertisement
UK cyber-security ncy said that US’ National Security ncy (NSA) has also agreed with attribution and details provided in report. British government called for an end to “irresponsible” cyberattacks by Russian Intelligence Services, accusing m of collecting information on vaccine development.
Advertisement
'Completely unacceptable'
Foreign Secretary Dominic Raab said it is “completely unacceptable” that Russian Intelligence Services are targeting those working to combat coronavirus pandemic. He ded that UK and its allies are working hard to find a vaccine and protect global health while ors pursue ir “selfish interests with reckless behaviour”.
“ UK will continue to counter those conducting such cyber attacks, and work with our allies to hold perpetrators to account,” Raab said in a statement.
Advertisement
NCSC revealed that kwn targets of APT29 include UK, US and Canian vaccine research and development organisations. It claimed that group uses a variety of tools and techniques, including spear-phishing and custom malware kwn as “WellMess” and “WellMail”. Paul Chichester, NCSC Director of Operations, has urged organisations to familiarise mselves with vice ncy published to help defend ir networks.
Advertisement
20:08 IST, July 16th 2020