Home Hacking Using Android Malware Russian Hackers Tracked Ukrainian Artillery Unites

Using Android Malware Russian Hackers Tracked Ukrainian Artillery Unites

2 min read
0
0

Using Android Malware Russian Hackers Tracked Ukrainian Artillery Unites

After FBI and CIA confirms that Russian hackers were responsible for leak during the US election which helped Donald Trump to win the US elections.

Now  CrowdStrike, a cyber security firm based in Irvine, California released a report which outlined another hack which targeted the Android devices of Ukrainian separatists fighting in Eastern Ukraine in 2014, giving the Russian military essential location information about artillery units which was used to target strikes and coordinate military action.

The malware implant in Ukraine leveraged a legitimate Android application, developed by a Ukrainian artillery officer to process targeting data more quickly, CrowdStrike said, with co-founder Dmitri Alperovitch adding;

According to CrowdStrike, the Ukrainian malware implant would be the first time malicious software from Fancy Bear has been found on the Android platform, though downloads of the affected app were promoted on a Russian social media website and downloaded directly, with no evidence that the application was made available on the Google Play Store, limiting its distribution.

The prospect of malware on Android being used by Russian intelligence in both front-line conflict and within the political spectrum will reinforce the ever-evolving view that modern day warfare, as well as espionage, is going to be fought on the digital front as much as the physical front. The news will also reinforce the message from companies like BlackBerry and Boeing that device security will be absolutely paramount for government and military organisations in the future.

Source: Reuters.com

Load More Related Articles
Load More In Hacking

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also

New Cold Boot Attacks Can Evade Current Mitigations

New Cold Boot Attacks Can Evade Current Mitigations Many people tend to put laptops to ‘Sl…