After the DDoS attack, cyber specialists of Ukrainian intelligence gained access to the Russian MOD servers. It was another successful operation of the Defence Intelligence of Ukraine (DIU) team against the aggressor country.
DIU hacked Russia's MoD. What is currently known
At the disposal of the spies were information protection and encryption software used by enemy agencies, as well as an array of secret official documents of the specified ministry.
What is essential to understand is that it is related to orders, reports, directives, reports and other documents circulated between over 2,000 structural units of Russian MOD.
This makes it possible to establish the complete structure of the department's system and its links.
In addition, it is emphasised that the analysis of the received data also helped to identify the general, other high-ranking managers of the structural divisions of the ministry, as well as deputies, assistants, and specialists — all those who used software for electronic document management called "bureaucrat".
Moreover, the DIU cyber specialists were able to get the official documents of the Ivanov Timur Vadimovich, who serves as deputy head of Russia's Ministry of Defence chief Sergei Shoigu.
According to intelligence officers, he played an essential role in the success of the cyber attack.
DIU has already carried out cyber attacks on Russia's MoD
On Jan. 30, DIU cyber specialists entered the Russian MOD Server, which is used for special communications.
As a result of a successful operation, it was possible to block the exchange of data between departments that used the specified server located in Moscow.
The FSB of Russia approved the software on the attacked server as meeting state information protection standards.