Hackers attacked the contractor of the Russian Federal Security Service, 7.5TB of data theft

Hacking the Russian Federal Security Service (FSB) server, they get 7.5TB of data from the FSB contractor SyTech. Many intruders have disclosed data related to non-public Internet project, such as how the Russian Tor to anonymize traffic, collects information about a user's social network and Internet services in Russia and the rest of the world to isolate.

The attack on July 13, 2019 of an unknown hacker organization 0v1ru $ initiated, the organization recently created a Twitter account and posted a screenshot of the infected computer files belonging to the folder. Posted on Twitter in different picture, a picture of the amount of information displayed is 7.5TB. During the attack, the hackers also use the "Yoba-face" to destroy the company's website, which is Russian users of popular emoticons.

According to Russian media reports, these documents show that since 2009, SyTech has undertaken a number of projects for the FSB and its counterparts contractors Quantum. The project includes:

Nautilus - a collection of social media users (such as Facebook, MySpace and LinkedIn) project data.

Nautilus-S - de-anonymizing Tor traffic on the project with the help of malicious Tor server.

Reward - secretly infiltrate a P2P network project, just as the seed for the network.

Mentor - a monitor e-mail communications and search for items on the Russian company's server.

Hope - a Russian Internet topology and other items connected to the national network of investigation.

Tax-3 - is used to create a closed intranet project for storing highly sensitive state officers, judges and local government information officials from other IT network in the state.

Other documents show that there are other older research projects for other network protocols such as Jabber, ED2K (eDonkey) and OpenFT (enterprise file transfer). Hacked SyTech company has shut down its Web site and refused media interviews.

Source: ZDNet

Guess you like

Origin www.linuxidc.com/Linux/2019-07/159518.htm