Why are Russian hackers targeting COVID-19 vaccine laboratories?

Article by: Dmytro Sherenhovskyi, Analytical Center at the Ukrainian Catholic University

The Canadian intelligence says it discovered cyberattacks on laboratories searching for a coronavirus vaccine. And similar incidents with the aim of stealing information have also occurred in the United Kingdom and the United States.

Although hacker attacks, including on medical centers, are nothing new, this case is special.

The intelligence services unanimously declare that it’s highly probable that the APT29 group, also known as Cozy Bear or The Dukes, which works for Russian intelligence, is behind the attacks.

The first official charges

Photo: crowdstrike

While countries are struggling to invent a vaccine to protect global health, “others pursue their selfish interests with reckless behavior.” This is how British Foreign Secretary Dominic Raab reacted to information about Russian cyberattacks.

Of course, Russia immediately denied all charges. Putin’s spokesman Dmitry Peskov denied Russian involvement in the hacker group, saying there was no evidence.

However, Canadian intelligence has identified that the malicious programs WellMess and WellMail, which were used in attacks on other sites in the world during the pandemic, have a Russian trace.

This is not the first time Canadian laboratories conducting research on the development of a coronavirus vaccine have suffered cyberattacks.

For example, in May national security forces noticed attempts to hack into the databases of such companies, but did not say whether they were able to identify those behind the attacks.Now, however, is the first time that Russia, which was previously suspected of involvement in similar attacks, along with China, Iran and North Korea, has been formally charged.

Previous indirect allegations did not have much resonance and consequences. We will see in the near future how the situation will flare up and whether Canada, the United States, and the United Kingdom will take more active action.

Attacks on laboratories

Throughout the COVID-19 pandemic, there have been a number of similar attacks on medical laboratories and research centers with attempts of spying and stealing data on vaccine development.

The biggest problem is that developing vaccines is an expensive and time-consuming endeavour, so laboratories are often networked together by digital means of communication, making them easy targets for cyberattacks.

Back in March, the WHO said that attackers tried to break into the system through e-mail password phishing – one of the most popular methods (about 90% of all cybercrimes occur through e-mail phishing). More than 450 active WHO e-mails and passwords have been stolen with the aim of accessing databases.

This did not affect the operation of the system itself, which had an upgrade, but damaged the previous system, which was still used to communicate with partners and retired staff.

Another situation arose at the University Hospital in Brno, which is the largest coronavirus testing center in the Czech Republic.

As a result of a direct cyberattack in March 2020, the hospital was cut off for two days from access to forwarding and receiving information from the national database. The cyber attack also affected a nearby children’s hospital and maternity hospital.

The Czech security services were not to establish who was behind the attack and whether any information was stolen.

In April, the United States accused China of trying to break into a system of research centers developing a coronavirus vaccine.

One of the most influential companies in the field of cybersecurity, FireEye, said that it was the Chinese hacker group APT41 that carried out this largest cyber attack in recent years. It was partially repelled thanks to the active opposition of the US National Security Agency and the US Cyber ​​Command.

In May, attacks on medical and research centers took place in many countries around the world. In Israel, for example, there was a large-scale attack on websites, which affected lab networks.Security services said it was an attempt to stop the development of the vaccine, not just to steal information.

Similar situations have arisen in Australia, France, Spain, and other countries.

This activity is nothing surprising. Whoever develops the vaccine first will not only receive reputational bonuses, but also financial success.

This means that any information and research results are desirable for many players in the pharmaceutical market.

However, cases involving government-backed hacker groups look immoral, at the very least.

While governments, private businesses, and international organizations spend heavily on vaccine development, some governments don’t shirk away from not only stealing information but also blocking the development for personal dividends.

However, while Chinese cyberattacks are known primarily for their focus on economic espionage, their Russian counterparts are more often seen in a political context.

A Russian trace

Image: news.softpedia.com

If a hacker group called The Dukes is really involved in this story, it can gain interesting momentum.

This group is not a newcomer to the market of cybercrime and e-espionage. In one combination or another, it has been operating since at least 2008, working and collecting data for Russian intelligence.

The work in Russia is evidenced not only by the “anti-Western” nature of the operations but also by the presence in the codes of the text of errors (error message) in Russian, as well as the time of their main activity – between 9 and 19 hours Moscow time.The Dukes are linked to interference in the 2016 US election, including the theft of information from the National Committee of the Democratic Party of the United States.[/box

In its analytical report, the Finnish software company F-Secure claims that the first operations of the Dukes that could be identified took place in November 2008 under the names “alkavkaz.com20081105” and “cihaderi.net20081112.”

Russian hackers portrayed some sites as Chechen information centers to report “world jihad news,” and distributed malicious programs in an attempt to use the site.

In 2009, a number of campaigns were launched against the Georgian Ministry of Defense and the Ministries of Foreign Affairs of Turkey and Uganda, and most importantly, US-based think tanks, the NATO Information Center in Georgia, and government institutions in Poland and the Czech Republic.

The attacks were carried out by sending e-mails to which specially created documents in Microsoft Word and PDF format were attached, which released Trojans when opened.

These campaigns demonstrate a clear political commitment from The Dukes, as they are thought to have been about gathering information about the location of the US air defense base in Poland and radar in the Czech Republic.

Since 2013, e-mail phishing through infected PDF files became the most common method of hacking attacks.

The F-Secure report mentions that the infections occurred in more than 29 countries, with some government agencies in Ukraine, Belgium, Hungary, Portugal, the Czech Republic and the United States being the biggest targets.However, most campaigns against Ukraine took place on the eve of Euromaidan in 2013.

The most serious cases were when the Ukrainian MFA received a letter from the Dutch embassy, when a letter of the First Deputy Foreign Minister of Ukraine on the 100th anniversary of the beginning of the First World War was infected, and when an infected PDF document titled “Ukraine’s Search for a Regional Foreign Policy” was sent around.

That this group’s goal may be gathering intelligence is evidenced by the fact that their activity in Ukraine took place before Russian aggression. As soon as Russia switched to direct hostilities in Ukraine, The Dukes ceased operations, while other groups, such as Operation Pawn Storm, began operations.

Therefore, it is safe to assume that, in addition to data on a potential vaccine, the current attacks have a goal that’s related more to intelligence than commerce, and may be related to the study of weaknesses that can be used to intervene in political processes.

Russia desperately needs the status of a savior of the world from COVID-19 to promote the need to return Western countries to dialogue with it and lift sanctions.

And for the Kremlin, it’s acceptable to achieve this goal by any means. Even if the price is a delay in the creation of a vaccine that can save hundreds of thousands of lives.

(c) EuromaidanPress

4 comments

  • “Russia desperately needs the status of a savior of the world from COVID-19 to promote the need to return Western countries to dialogue with it and lift sanctions.”

    Scum of the world more like it. Russia don’t make anything to save lives, and never have. A country were 50% of the hospitals have no water, are supposed to have the money to develop a vaccine? Russia, along with the makers of this bat virus, China, will lie cheat and steal to develop a vaccine, then attack the same research laboratories to stop further development.

    Liked by 3 people

  • Because they can not produce anything, I mean anything, without stealing the procedure, the equipment and the knowledge…………………….
    What to do? Invade, rob the local factories like in Donbas, hack everything worldwide, spies……………………

    Liked by 5 people

  • англійський масон

    The shitbags are incapable of doing anything honest.

    It is natural for them to spend twice the amount of money to do something dishonest or to steal something, than it is to ask for it or pay for it to obtain it honestly.

    Liked by 3 people

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.