World

Russian Federation was behind 'malicious' cyber attack on Ukraine, Foreign Office says

Russian Federation was behind 'malicious' cyber attack on Ukraine, Foreign Office says

In a prepared statement the ministry said the decision to attribute the incident publicly underlines the fact the United Kingdom and allies are not going to tolerate any malicious cyber activity.

The British government says Russian Federation was behind a huge cyber attack last summer that impacted most of Europe and is estimated to have cost companies more than $1.2 billion.

Any such operations may well be seen as proportionate response, as another of the quotes from Lord Ahmad mentions the "hundreds of millions of pounds" in costs wrought by NotPetya.

"The malware was not created to be decrypted".

A statement from the Foreign Office on Thursday said the attack, which took place on 27 June 2017, tried to disguise itself as the work of a criminal enterprise but was meant mainly to disrupt.

"The UK government judges that the Russian government, specifically the Russian military, was responsible for the destructive NotPetya cyber-attack of June 2017", he is reported to have said.

In September, FedEx attributed a $300 million loss to the attack.

NotPetya ransomware attack White House Not Petya statement Russian cyber threats Kremlin intervention cyber defense Not Petya Russian hackers 2016 US elections Russia Ukraine activities cybersecurity
Britain Blames Russia For 'Malicious' 2017 Cyberattack

NotPetya first hit the Ukraine, which quickly claimed Russian Federation was the malware's source and claimed its deployment was made as part of ongoing destabilisation attempts.

It spread via the NSA-developed EternalBlue and EternalRomance exploits but also via other techniques, such as using legitimate tools PSExec and WMIC.

The Kremlin has denied involvement in the attack - which is thought to have costs businesses across the Continent over $1.2bn - and claimed some Russian companies were also targeted and their systems infected.

The attack contaminated thousands of computers worldwide, particularly affecting multinational companies and critical infrastructure, such as radiation monitors at the old Chernobyl nuclear power plant and the ports of Mumbai and Amsterdam.

The NotPetya attack saw a malicious data encryption tool inserted into a legitimate a piece of software used by most of Ukraine's financial and government institutions.

Ukraine's financial, energy and government sectors were all targeted, but the bug's indiscriminate set-up meant it spread into Europe and even back to Russian Federation. The idea, in part at least, is to name and shame nation-state attackers for their actions. A derivative of the WannaCry ransomware attack, it spread to numerous organisations around the world from Kiev airport to the port of Mumbai.

Lord Ahmad thinks the Russian government has positioned Russia in direct opposition to the West.