DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ukraine’s security service claims to have thwarted mass cyberattack by Russian special forces

Posted on June 6, 2021 by chum1ng0

The following is a machine translation of a press release by  Служба безпеки України, the Security Service of Ukraine:


The SBU blocked a mass cyberattack by Russian special services on the computer networks of the Ukrainian authorities

Cyber ​​experts of the Security Service of Ukraine revealed the facts of purposeful distribution of malicious software by the special services of the Russian Federation. Customers planned to hit the computer networks of public authorities, local governments and critical infrastructure.

Specialists of the Security Service of Ukraine established that in early June this year, mass e-mails were sent with a change of address of the sender. In particular, reports from the Kyiv Patrol Police Department allegedly contained malicious attachments and were sent to a number of government agencies.

Malicious software initiates the installation of the client part of the program (remote administration tool) on the affected computer. This allows the foreign intelligence service to remotely exercise full control over the PC. Control and command servers have been installed, which are located on the territory of the Russian Federation.

Cyber ​​experts of the Security Service of Ukraine recommend an urgent inspection of information and telecommunications systems, in particular using indicators published in the platform “MISP-UA” to identify their possible compromise and take prompt precautions.

Compromise indicators:

File name sha1 sha256
Electronic request.rar ce4bf04087f7a011ef020fce81d00a393e37f679 ad15d2d402b03d0dc0fb55842c8159 b868448b8459b4c468b325c225393cfcf4
Electronic request.pdf.rar 2ed6b02df189dbb1d07d76886957d5f7cdcd1463 23388220f257056878c17c5f4f44d1b1a8 478328bbbd14a450ea9bd141021763
Access code 030621.txt e285193b27d5ea1c644973993415bbf9baad86a0 bf135c2003dee739fa69e7f2ee7d460d61 edddfff3747920ee0dbeb1c9f311b2
Electronic request.pdf.exe 9480842a7a94c378ed27771c724bada5bdb758c4 e065fb7712e0c7a8ba1db464bd8d97443 b10d7162c9930fc5a9576c7871e4c78

Command and control servers:

  • 178.210.76.171 (Ru-Center, RF),
  • 176.9.64.70 (Hetzner, Germany)
  • 185.231.68.230 (Zomro, Netherlands)

Domain name:

  • «Rmssrv.ru»

The connection is made to ports 5651, 8080 and 81

To clean the affected computers from the specified SPZ requires:

  • stop a service named Remote Utilities – Host
  • remove directory C: \ Program Files (x86) \ Remote Utilities – Host \

Original Source: Служба безпеки України.


Related:

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident' impacting city's IT systems
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
Category: Government SectorNon-U.S.Of Note

Post navigation

← Azusa officials hid 2018 cyber attack, used insurance to pay $65K ransom to hackers
Au: NSW Health confirms data breached due to Accellion breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Leavenworth, Kansas cyberattack disrupts city services
  • They’ve escaped a lot of media attention, but Anubis RaaS is a threat to the medical sector
  • “In the most expedient time possible…”
  • Portugal updates cybercrime law to exempt security researchers
  • LockBit 5’s “new secure blog domain” infra leaked already
  • NL: Nuenen accidentally leaks addresses of 1,000 asylum center opponents
  • Ex-teen hackers warn parents are clueless as children steal ‘millions’
  • UK Government Considers Computer Misuse Act Revision
  • Japan issues arrest warrant against teen suspected of cyberattack using AI
  • How old is the average hacker? What does a new research report suggest? (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.