NotPetya hackers obtained source code of accounting software to wreck Ukrainian businesses

NotPetya hackers obtained source code of accounting software to wreck Ukrainian businesses

Russian hackers target Ukrainian government agencies with watering-hole attacks

The Ukrainian Cyber Police have seized servers of a firm behind accounting firm ME Doc’s software which was taken over by hackers to disrupt work at the central bank, government offices, and a majority of businesses in the country.

The software maker may face criminal charges for ignoring warnings from security experts about an impending cyber-attack.

Following the seizure, the Ukrainian cyber police have confirmed that hackers behind the Petya/NotPetya malware attacks in Ukraine carried out a supply chain attack to access the source code of accounting software created by Intellect Service and owned by accounting firm ME Doc.

Not just a ransomware attack: Petya cyber-attack was meant to destabilise Ukraine

“Once they have access to the source code, they installed a backdoor in one of the program updates, which installs unauthorised remote access [Trojan] on the computers of ME Doc users,” the police added.

The accounting software created by Intellect Service is widely used in Ukraine for tax filing purposes by banks, media organisations, transport, telecommunications, and energy departments. It is also used by over 80 per cent of businesses in the country for tax filing.

Since the software has been quarantined, Ukrainian authorities have extended the deadline for end-of-year tax filing by a month to help businesses complete their paperwork using alternate software or other methods. Those still using ME Doc software have been advised to change their passwords and digital signatures at the earliest to avoid being targeted by hackers in the future.

At the moment, Ukraine’s security service SBU is conducting a joint investigation on the NotPetya cyber-attacks along with the FBI, Europol, the UK’s National Crime Agency and other international agencies.

The NotPetya cyber-attacks also affected operations at global firms like Danish shipping company Maersk, Russian oil giant Rosneft, aircraft manufacturer Antonov, US pharmaceutical giant Merck as well as its subsidiary Merck Sharp & Dohme (MSD) in the UK.

Petya ransomware attack hits firms globally

Ukrainian authorities have maintained that the cyber-attacks were sponsored by Russia to destabilise Ukraine, shut down the country’s critical infrastructure along with other institutions like the central bank, cabinet offices, and postal services.

“War in cyberspace, seeding fear and horror among millions of personal computer users, and inflicting direct material damage from destabilizing the work of businesses and the state, is just one part of the hybrid war of the Russian empire against Ukraine,” said Ukrainian member of Parliament Anton Gerashenko.

“A cyber attack with the ultimate goal of an attempt to destabilize the situation in the economy and public consciousness of Ukraine was disguised as an attempt to extort money from computer owners,” he added.

Copyright Lyonsdown Limited 2021

Top Articles

RockYou2021 data leak: 8.4 billion passwords compromised

A report shows that 100GB of data which includes 8.4 billion passwords have been recently leaked on the internet, people are being encouraged to secure their accounts.

Hackers Breach Electronic Arts & Steal Game Code

Electronic Arts, one of the world's biggest video game publishers including games such as FIFA, Madden, Sims and Medal of Honor, are the latest company to be hacked.

JBS Foods paid £7.7m in ransom to REvil ransomware gang

JBS Foods, the world’s largest processor of beef and poultry products, has admitted to paying a ransom of $11 million to cyber criminals, a week after it announced that operations…

Related Articles

[s2Member-Login login_redirect=”” /]