Submitted by Hrmbee t3_126shm9 in technology
Comments
ACCount82 t1_jeatkea wrote
"NTC Vulkan" being tied to Kremlin is not news, but just how involved it was in some of the attacks is certainly new info.
Minuenn t1_jeb11kc wrote
I didn’t realize he hated DirectX too. I can’t wait for Vulkan to take off
SkyReaction t1_jeb482d wrote
Must be because of the anti-russian D3D documentation
[deleted] t1_jeak57v wrote
[removed]
[deleted] t1_jebckbc wrote
[deleted]
[deleted] t1_jebb83q wrote
[removed]
Pikkornator t1_jeazr12 wrote
ah the old Russia bad boooo boooo AND America so great lol I think these articles can only be writen is they take all sides seriously. People remember the arabic spring?? Where the youth got brainwashed to play a coop? guess who was behind these things and current day propaganda on social media including this piece. Its really easy to spot when you know where to look.....
ACCount82 t1_jeb3xz1 wrote
Yeah, it's really easy to spot yet another Kremlin shill going in hot with whataboutism.
GhostofDownvotes t1_jecugn6 wrote
Good post. Your conscription has been delayed by 4 hours, comrade.
Hrmbee OP t1_jeallx6 wrote
>The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin’s cyberwarfare capabilities. > >Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. > >One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks. > >Another system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia’s command, and also enables disinformation via fake social media profiles. A third Vulkan-built system – Crystal-2V – is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. A file explaining the software states: “The level of secrecy of processed and stored information in the product is ‘Top Secret’.” > >The Vulkan files, which date from 2016 to 2021, were leaked by an anonymous whistleblower angered by Russia’s war in Ukraine. Such leaks from Moscow are extremely rare. Days after the invasion in February last year, the source approached the German newspaper Süddeutsche Zeitung and said the GRU and FSB “hide behind” Vulkan.
At this point, this may not be the most surprising news, but it's still useful to have confirmation about some of the scope and details of these operations. One of the questions that is raised by these revelations though is what knowledge did major technology players have about these operations, and what measures were taken to defend against them?