The first official charges

Now, however, is the first time that Russia, which was previously suspected of involvement in similar attacks, along with China, Iran and North Korea, has been formally charged.
Attacks on laboratories
Throughout the COVID-19 pandemic, there have been a number of similar attacks on medical laboratories and research centers with attempts of spying and stealing data on vaccine development. The biggest problem is that developing vaccines is an expensive and time-consuming endeavour, so laboratories are often networked together by digital means of communication, making them easy targets for cyberattacks. Back in March, the WHO said that attackers tried to break into the system through e-mail password phishing - one of the most popular methods (about 90% of all cybercrimes occur through e-mail phishing). More than 450 active WHO e-mails and passwords have been stolen with the aim of accessing databases. This did not affect the operation of the system itself, which had an upgrade, but damaged the previous system, which was still used to communicate with partners and retired staff. Another situation arose at the University Hospital in Brno, which is the largest coronavirus testing center in the Czech Republic. As a result of a direct cyberattack in March 2020, the hospital was cut off for two days from access to forwarding and receiving information from the national database. The cyber attack also affected a nearby children's hospital and maternity hospital. The Czech security services were not to establish who was behind the attack and whether any information was stolen. In April, the United States accused China of trying to break into a system of research centers developing a coronavirus vaccine. One of the most influential companies in the field of cybersecurity, FireEye, said that it was the Chinese hacker group APT41 that carried out this largest cyber attack in recent years. It was partially repelled thanks to the active opposition of the US National Security Agency and the US Cyber Command. In May, attacks on medical and research centers took place in many countries around the world. In Israel, for example, there was a large-scale attack on websites, which affected lab networks.Security services said it was an attempt to stop the development of the vaccine, not just to steal information.
A Russian trace
Trending Now

The Dukes are linked to interference in the 2016 US election, including the theft of information from the National Committee of the Democratic Party of the United States.[/box
In its analytical report, the Finnish software company F-Secure claims that the first operations of the Dukes that could be identified took place in November 2008 under the names "alkavkaz.com20081105" and "cihaderi.net20081112".
Russian hackers portrayed some sites as Chechen information centers to report "world jihad news," and distributed malicious programs in an attempt to use the site.
In 2009, a number of campaigns were launched against the Georgian Ministry of Defense and the Ministries of Foreign Affairs of Türkiye and Uganda, and most importantly, US-based think tanks, the NATO Information Center in Georgia, and government institutions in Poland and the Czech Republic.
The attacks were carried out by sending e-mails to which specially created documents in Microsoft Word and PDF format were attached, which released Trojans when opened.
These campaigns demonstrate a clear political commitment from The Dukes, as they are thought to have been about gathering information about the location of the US air defense base in Poland and radar in the Czech Republic.
[highlight]Since 2013, e-mail phishing through infected PDF files became the most common method of hacking attacks.[/highlight]
The F-Secure report mentions that the infections occurred in more than 29 countries, with some government agencies in Ukraine, Belgium, Hungary, Portugal, the Czech Republic and the United States being the biggest targets.
However, most campaigns against Ukraine took place on the eve of Euromaidan in 2013.
Read more:
- Beware of Russia’s bilateral cyber world order
- Russia-linked cyber attacks targeted 104 accounts of European think tanks
- The Kremlin’s cyber contractors. Their motives and risks
- How states can get real about Russian cyber attacks: Estonia, the UK, and Poland explain