Advertisement

Global cyber attack likely cover for malware installation in Ukraine: police official

A passenger waits at a check-in counter at the capital's main airport, Boryspil, outside Kiev, Ukraine, June 27, 2017. REUTERS/Valentyn Ogirenko

By Pavel Polityuk KIEV (Reuters) - The primary target of a crippling computer virus that spread from Ukraine across the world this week is highly likely to have been that country's computer infrastructure, a top Ukrainian police official told Reuters on Thursday. Cyber security firms are trying to piece together who was behind the computer worm, which has paralysed thousands of machines worldwide, shutting down ports, factories and offices as it spread through internal organisational networks to an estimated 60 countries. Ukrainian politicians were quick on Tuesday to blame Russia, but a Kremlin spokesman dismissed "unfounded blanket accusations". Kiev has blamed Moscow for two previous cyber strikes on the Ukrainian power grid and other attacks since Russia annexed Crimea in 2014. A growing consensus among security researchers, armed with technical evidence, suggests the main purpose of the attack was to install new malware on computers at government and commercial organisations in Ukraine. Rather than extortion, the goal may be to plant the seeds of future sabotage, experts said. International firms appear to have been hit through their operations in the country. Slovakian security software firm ESET released statistics on Thursday showing 75 percent of the infections detected among its global customer base were in Ukraine, and that all of the top 10 countries hit were located in central, eastern or southern Europe. The malicious code in the new virus encrypted data on computers and demanded victims pay a $300 ransom, similar to extortion tactic used in the global WannaCry ransomware attack in May. Echoing working hypotheses from top cyber security firms including Cisco and Kaspersky, a top Ukrainian official told Reuters that the ransom demands were likely a smokescreen. "Since the virus was modified to encrypt all data and make decryption impossible, the likelihood of it being done to install new malware is high," the official, who declined to be identified, wrote in a phone text message to Reuters. Information Systems Security Partners (ISSP), a Kiev-based cyber research firm that has investigated previous cyber attacks against Ukraine, is pursuing the same line of inquiry. ISSP said that given that few people actually paid the $300 demanded for removing the virus, money was unlikely to be the primary object of the attack. "It's highly likely that during this attack new attacks were set up," said ISSP chairman Oleg Derevianko. "At almost all organisations whose network domains were infected, not all computers went offline," he said by phone. "Why didn't they all go offline? We are trying to understand what they might have left on those machines that weren't hit." Some cyber security researchers have said the fact that the Kremlin's two flagship energy companies are victims of the attack suggests Moscow was not behind it. Russian oil major Rosneft was one of the first companies to reveal it had been compromised by the virus and sources told Reuters on Thursday computers at state gas giant Gazprom has also been infected. (Additional reporting by Eric Auchard in Frankfurt, Jack Stubbs in Moscow and Mark Hosenball in Washington D.C.; writing by Matthias Williams; editing by John Stonestreet)