Back to home
Technology

Pro-Ukrainian hackers take credit for attack that snarls Russian flight travel

Source

Ars Technica

Published

TL;DR

AI Generated

Pro-Ukrainian hackers have claimed responsibility for a cyberattack that led to the cancellation of dozens of flights by Russia's largest airline, Aeroflot. The airline cited a "technical failure" as the reason for the cancellations, which affected both domestic and international routes. Russian prosecutors have confirmed that the disruption was due to a hack and have initiated a criminal investigation. Lawmakers in Russia have suggested that the cyberattack may have been orchestrated by hacktivists with support from hostile nations.

Read Full Article

Similar Articles

Catastrophic Jaguar Land Rover cyberattack to cost UK economy at least $2.5 billion, according to estimates — 5,000 independent organizations decimated by supply chain fallout

Catastrophic Jaguar Land Rover cyberattack to cost UK economy at least $2.5 billion, according to estimates — 5,000 independent organizations decimated by supply chain fallout

A recent cyberattack on Jaguar Land Rover and its supply chain of over 5,000 organizations is estimated to have cost the UK economy around $2.5 billion. The attack, which shut down manufacturing plants globally, resulted in significant financial losses and ongoing production delays. The report highlights the severe economic impact on JLR and its suppliers, with potential further losses as the effects ripple through secondary and tertiary suppliers. Other major UK businesses, like Marks and Spencer, have also suffered substantial financial losses due to cyberattacks in the past year.

Tom's Hardware
Hackers attack Europe’s automatic flight check-in systems — flight delayed and cancelled after Collins cyberattack

Hackers attack Europe’s automatic flight check-in systems — flight delayed and cancelled after Collins cyberattack

A cyberattack on Collins Aerospace disrupted Europe's airport infrastructure, impacting self-service kiosks and causing flight delays and cancellations at major hubs like Heathrow and Brussels. The attack targeted Collins' common-use MUSE platform, which facilitates passenger processing for multiple airlines. The outage highlighted vulnerabilities in Europe's airport IT systems, emphasizing the need for robust cybersecurity measures. The incident prompted a shift to manual processes at affected airports, showcasing the importance of preparedness for such disruptions. New EU directives aim to enhance cybersecurity for critical aviation infrastructure, emphasizing the significance of safeguarding shared platforms like cMUSE.

Tom's Hardware
Two of the Kremlin’s most active hack groups are collaborating, ESET says

Two of the Kremlin’s most active hack groups are collaborating, ESET says

Security researchers have discovered that two of the Kremlin's most active hacking groups, Turla and Gamaredon, are collaborating in malware attacks targeting high-value devices in Ukraine. Turla is known for its sophisticated and well-funded operations, with past breaches including the US Department of Defense and European government entities. In contrast, Gamaredon conducts broader operations, particularly in Ukraine, and is less concerned about being linked to the Russian government. Both groups are believed to be affiliated with Russia's Federal Security Service (FSB).

Ars Technica
Microsoft catches Russian hackers targeting foreign embassies

Microsoft catches Russian hackers targeting foreign embassies

Microsoft has identified Russian-state hackers targeting foreign embassies in Moscow using custom malware installed through adversary-in-the-middle attacks at the ISP level. The campaign, ongoing since last year, exploits ISPs in Russia, which are compelled to assist the Russian government. The threat group, known as Secret Blizzard, intercepts communications between embassies and their connections, redirecting them to malicious websites. This operation, named ApolloShadow, marks the first confirmation of such cyber espionage capabilities at the ISP level, making diplomatic personnel in Russia vulnerable targets.

Ars Technica

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.