Why does NYT hold Russia responsible for hacking in Burisma

Just like the hack that took place in the year 2016 in the Democratic National Committee and alarmed the people, in the same way, the reported events are echoing of the international chaos that can take place in 2020. The mystery of the new hack by Russian intelligence services targeting Burisma was lately uncovered by The New York Times and cyber security firm Area1. The hack focused upon Ukrainian Natural Gas Company. In the previous months, it was unknown and undiscovered whose mind was behind the hack? But, several republicans hinted at the corruption that was sprucing inside the company. It also hinted at the worst upcoming events that will cause more chaos among st people.

What’s predicted?

Some of those who are at the side of Congress are predicting that the happenings of 2016will repeat and we will experience the same situation once again this year. Rep. Adam Schiff (D-CA) also made a statement regarding this in which he said: “It certainly looks like they are at it again intending to help this president.” Also, there are no indications that Trump will do anything to make the situation better. The found evidence strongly suggests that Burisma was successfully targeted by a phishing campaign. But nobody is sure about the mastermind behind it. Some evidence hint towards the involvement of Russia’s GRU intelligence service. The case remains incomplete because of the conditional pieces of evidence. More Information :- www.mcafee.com/activate.

Area1 has made an eight-page lengthy report speaking concerning the pieces of evidence that they have found. The pattern of attacks on Bursima is the major evidence in this attack. It was found out that the hacker used the same domain registrars and ISPs to accomplish their evil goals. In this campaign, the same SSL provider and versions of the same URL were used by the attackers. “My Sharepoint” was the masque under which all these activities were taking place. Upon this, Kyle Ehmke stated that “We see consistencies, but in some cases, those consistencies aren’t consistent with a single actor.”

What should be done?

Network operators should raise the alarm they encounter such kinds of attacks. We should also consider the term “Sharepoint”. This should be done because the researchers have seen it only in the URLs that are closely linked to the GRU. But one cannot take the word “Sharepoint” into consideration because anyone can use it. Hence, this also becomes circumstantial. Here, again I would like to quote Mr. Ehmke who said: “It’s a notable set of consistencies to look for and potentially use to identify their infrastructure.” Adding to this, he said, “But that’s not to say that everything that has those consistencies has been and will be APT28.”

We can expect the same happening which took place in 2016 during the elections in the year 2020 as well. This is something important for those who are worried about Russian meddling.

Smith Loo has been a writer in the technical field for quite long. His articles basically focus on helping users with various problems that they are facing while using different technologies. You may come across his writings on several web sites and hopefully, you will find them informative. You will find the latest information in his articles. Visit@:- McAfee.com/Activate.

Add a Comment

Your email address will not be published. Required fields are marked *


CAPTCHA Image
Reload Image