• Languages
Language (English)
  • Українська (UA)
  • Русский (RU)
  • English (EN)
  • Deutsch (DE)
  • Français (FR)
  • Español (ES)
  • Беларуская (BY)
  • Български (BG)
  • Polska (PL)
  • Čeština (CZ)
  • Slovenský (SK)
  • Lietuvių (LT)
  • Latvijas (LV)
  • Nederlands (NL)
  • Português (PT)
  • Italiano (IT)
  • Svenska (SV)
  • Norsk (NO)
  • Dansk (DK)
  • ქართული (GE)
  • Română (RO)
  • Magyar (HU)
  • Ελληνικά (EL)
  • Deutsch (AT)
  • العربية (AR)
  • Türkçe (TR)
  • Azərbaycan (AZ)
  • Татарча (TAT)
  • 日本語 (JP)
  • 中文 (CN)
  • 한국어 (KR)

Logo

support informnapalm
Navigation
  • Home
  • News & OSINT
    • Donbas
    • Crimea
    • Syria
    • Georgia
    • World
    • Summaries
    • Misc
    • Social review
  • Top Investigations
  • History
  • About Us

The Security Service of Ukraine Repulsed Another Information Psychological Attack of the Russian Security Services

on 09/15/2014 | | Main News | News Print This Post Print This Post

The Security Service of Ukraine (SBU) detected and stopped another informational diversion of the Russian special services aimed at obtaining illegal access to personal data of citizens of Ukraine and proprietary information of public bodies.

While dealing with informational aggression of the Russian Federation against Ukraine, the SBU detected malicious software that Russian intelligence services used to obtain unauthorized access to the sensitive information.

Personal and official mailboxes of Ukrainian citizens were spammed with messages with a link to a sort of important information “about separatists in the Donetsk and Luhansk regions”. Email subjects and sender addresses constantly changed. In particular, one of such emails allegedly contained an aggregate list of hostages held by terrorists.

In fact, those emails contained a link to a file infected by a harmful virus, which could provide full control over the infected computer. It was established, that direction of these attacks was performed from a single control center that belongs to Russian special services.

“We repulsed this informational attack. But it is necessary to be prepared that that was not the last one. We should consider that during development of new versions of malicious software Russian special services would use methods of psychological sabotage. Because the first reaction of any normal person who had received an email with such a subject would be to open it in order to rush to help. This is their cynical intention”, said Markiian Lubkivskyi.

“The SBU urges people to be vigilant, pay attention to the sender address, delete suspicious emails, and report such cases of distribution of fake emails to law enforcement agencies”, he emphasized.

Source: СБУ відбито чергову інформаційно-психологічну атаку російської спецслужби

Tags: information warfareRussiaRussian FederationSBUSecurity Service of UkraineSSU

Recent Posts

  • Andriy Derkach and his tapes. About one special operation to interfere in the US presidential election

    08/10/2020 - 0 Comment
  • #BabakovLeaks: former Slovak Prime Minister Fico and the Russian gas needle

    09/16/2023 - 0 Comment
  • “Guards of Retreat” or how to devalue an age-old legacy

    09/16/2023 - 0 Comment
  • Cuban mercenaries fighting against Ukraine on the Russian side – Ukrainian hacktivists collected evidence

    09/08/2023 - 0 Comment

Related Posts

  • Russian information warfare: What to expect next?

    02/26/2022 - 0 Comment
  • Russian Ministry announces “digital attaché” service, will deploy in 16 countries

    02/10/2022 - 0 Comment
  • Kazakhstan is a new Pandora’s box for the Russian Federation.

    02/04/2022 - 0 Comment
Comments are closed.
Інтерактивна база даних російських підрозділів, задіяних до повномасштабного вторгнення в Україну

Donbas in Flames

Read the latest book “Donbas in Flames. Guide to the Conflict Zone” published by Prometheus Center. This guide will be useful to journalists, researchers, war experts, diplomats and general readers seeking information on the war in Donbas.

Download free PDF

Archives

  • Home
  • Privacy Policy
  • Contact Us
© 2014-2019. «InformNapalm». CC BY 4.0