Wednesday, October 9, 2024
HomeCyber Security NewsRussian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacks

Russian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacks

Published on

Russia-linked APT groups leveraged the Lithuanian nation’s technology infrastructure to launch cyber-attacks against targets worldwide.

A report by Lithuania’s intelligence service says  “Hacker groups linked to Russian intelligence conducted cyber-attacks against top Lithuanian officials and decision-makers last year and used the Baltic nation’s technology infrastructure as a base to hit targets elsewhere”.

The annual national security threat assessment report claimed that, among others, the Russian cyber-espionage group APT29 with alleged links to Russia’s intelligence services “exploited” Lithuania’s information technology infrastructure “to carry out attacks by APT29 against foreign entities developing a COVID-19 vaccine.”

- Advertisement - EHA

In 2020, Russian intelligence operations against Lithuania decreased due to the COVID-19 pandemic, however, Russia-linked APT groups increased cyber espionage campaigns against targets worldwide.

The COVID-19 pandemic and lockdown in Lithuania, a NATO member that is Russia’s neighbour and a former Soviet republic, decreased Russian intelligence operations against the country in 2020 and shifted the Kremlin’s efforts to cyber-espionage, according to the report produced by Lithuania’s State Security Department.

“Nevertheless, Russian intelligence operations pose a major threat to Lithuania’s national security,” State Security Department head Darius Jauniskis told Lithuanian lawmakers during the presentation of the report at the Parliament.

Jauniskis added that Moscow was using military and economic means and influencing by information “for the implementation of its political aims” in the Baltic nation of 2.8 million.

He blamed Russia for trying to use the pandemic as a way to create havoc in Lithuania, which he said had witnessed “dozens” of such “failed attempts” recently.

“Those activities were well-coordinated and fueled by anti-Western propaganda coming out from the Kremlin,” Jauniskis added.

The report states that both cyber attacks and disinformation campaigns have increased in Lithuania in the last 12 months. The security experts documented multiple hacking and disinformation campaigns, attributed to Russia-linked APT groups, that targeted Lithuania, Estonia, and Latvia in the last year.

Estonia’s foreign intelligence agency published its annual report saying, “Russia is counting on the COVID-19 pandemic to weaken unity in the West, which would help Moscow gain a more prominent role in international affairs and allegedly lead to declining Western influence on the global stage”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware

BootHole Vulnerability Affects Millions of Windows and Linux Systems – Allows Attackers to Install Stealthy Malware

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined...

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the...