The plans of Russian intelligence agency in cyber warfare have been exposed in the last few hours by a major leak that is becoming known as “Vulcan Files” in the international media.
Reports indicate a prime defense contractor based in Moscow responding to Vladimir Putin and has the ability to throw cyber attacks, sow disinformation and accuse specific goals in the United States and Europe through a army of hackers.
As published Thursday by the American newspaper The Washington Postthe details of the documents a set of computer programs and databases this would allow Russian intelligence agencies and hacker groups to better find vulnerabilities, coordinate attacks and monitor online activity.
The reports also detail that the companies involved have been backing operations that included both disinformation from social networks and training for remotely disrupt real-world targetssuch as maritime, air and railway control systems.
Apparently, a source provided the contractor’s documents, NTC Volcanoto a German journalist after expressing outrage at the Russian attack on Ukraineas a result of decisions made by the Kremlin.
So far, officials from five Western intelligence agencies and several independent cybersecurity firms make sure the documents are authenticsecond The Washington Post.
On the other hand, these officials and experts have failed to find definitive proof that the systems were deployed by Russia or used in specific cyberattacks, but the documents describe testing and payment for the work done by Vulkan for the Russian security services and various associated research institutes.
What is NTC Vulcan?
The controversial Russian company NTC Vulkan involved in the recent leak, also known as Science and research center “Vulkan”is mainly dedicated to development of advanced technologies for the aerospace, military and defense industries.
NTC Vulkan’s areas of expertise include the design of systems and components for rockets, jet engines, drones, navigation equipment and control systems. The company is also engaged in research and development in areas such as nanotechnology, materials science and laser technology.
NTC Vulkan has extensive experience in the research and development of advanced technologies and has been involved in numerous projects for the Russian government and other national and international clients. The company also has a significant presence in the export of Russian defense technology.
The cyber warfare plot directly involving Russia has several protagonists: the secret business dealings of the Russian military and espionage agencies, including the work of the government hacking group sand worm.
US authorities have accused Russian cybercriminals of causing two blackouts in Ukraine, disrupting the opening ceremonies of the 2018 Winter Olympics and launching Not Petyathe most economically destructive malware in history.
One of the leaked documents mentions the designation of Sandworm’s military intelligence unit number as 74455, suggesting that Vulkan was preparing software for use by the elite hacking team. The unsigned 11-page document, dated 2019, exposed a company official to approving the data transfer protocol for one of the platforms.
“Society is doing bad thingsand the Russian government is cowardly and wrong,” said the person who handed over the documents to the German journalist shortly after the invasion of Ukraine.
This anonymous source, who spoke to the reporter via an encrypted chat application, refused to identify himself before finalizing the contact, stating the need to disappear “like a ghost” for security reasons.
“I am angry about the invasion of Ukraine and the terrible things happening there”, admitted the source. “I hope they can use this information to show what goes on behind closed doors.”
Vulkan Files: What the Report Says
According to the publication, the document dated between 2016 and 2021 has more than 5,000 pages. Its contents include manuals, datasheets, and other details of the software Vulkan has designed for Russia’s military and intelligence establishment.
It also reveals internal corporate emails, financial documents and contracts exposing part of Russia’s cyber operations. This includes programs to create fake social media pages and software that can identify and archive lists of vulnerabilities in computer systems around the world for potential future targets.
Also, various UI prototypes for a project known as Amezit depicting examples of potential hacking targets, including the Swiss foreign ministry and a nuclear power plant in that nation. Another file shows a map of the United States with pointing circles Internet server groups.
An illustration of a Vulkan platform called Scan refers to a pinpoint location in the United States, referred to as “Fairfield”, as a place to find network vulnerabilities to use in an attack.
Meanwhile, another document directly describes a “user scenario” in which hacker teams will identify unsafe routers in North Korea, ostensibly for potential use in a cyberattack.
However, the files in question do not include verified target listsmalicious software code or evidence linking projects to known cyberattacks.
SL
Source: Clarin
Linda Price is a tech expert at News Rebeat. With a deep understanding of the latest developments in the world of technology and a passion for innovation, Linda provides insightful and informative coverage of the cutting-edge advancements shaping our world.