The brand new indictment additionally represents the primary official acknowledgement from the US authorities that Sandworm was chargeable for a cyberattack on the 2018 Winter Olympics, through which a piece of malware known as Olympic Destroyer took down a lot of the IT infrastructure of the Video games simply because the opening ceremony was starting in Pyeongchang, South Korea. Olympic Destroyer contained layers of “false flags,” spoofed clues in its code designed to trick investigators into blaming North Korea or China. And in line with the brand new indictment, Sandworm additionally tried to breach two Olympic accomplice organizations chargeable for timekeeping within the Olympics, not simply the Wifi, Olympics app, ticketing, and shows that have been in the end disrupted—maybe an try and corrupt the Olympics sporting occasions’ precise outcomes, too.
Within the greater than two years that adopted, no authorities on this planet formally seemed willing to blame the cyberattack on Russia, at the same time as personal intelligence companies like FireEye discovered strong evidence of Sandworm’s involvement, and US intelligence leaked their findings of Russia’s culpability to The Washington Post. (The European Union did lastly title “Olympic Destroyer” as one of many identified names for Sandworm in sanctions against the group in July, however with out explicitly saying that the sanctions have been in response to the Olympics assault.)
That lengthy silence led to warnings from the cybersecurity community that Russia would little doubt try and assault the 2020 Olympics in Tokyo, too. And individually from the Sandworm indictment, these warnings have been confirmed true immediately when the UK’s National Cybersecurity Center revealed that it had tracked, in a joint operation with US intelligence companies, reconnaissance actions by Russian hackers searching for to disrupt the 2020 Olympics as predicted—although the video games have been in the end delayed as a consequence of Covid-19—focusing on the video games’ organizers, logistics companions, and sponsors.
The Justice Division’s new indictment in opposition to the hackers features a lengthy historical past of different GRU hacking world wide: The hackers allegedly focused the Group for the Prohibition of Chemical Weapons within the Netherlands and the UK’s Protection Science and Expertise Laboratory whereas these two organizations have been investigating the Novichok poisoning of GRU defector Sergei Skripal and his daughter, an assault not beforehand linked to Sandworm regardless of known GRU involvement. The indictment additionally lays out new particulars of Sandworm’s focusing on of the nation of Georgia in 2019, which included an try and compromise the Georgian parliament along with a beforehand identified campaign of web defacements across the country’s internet, affecting 15,000 sites.
Maybe most importantly, the prison prices mark the primary international legislation enforcement response focusing on Sandworm’s hackers for his or her launch of the NotPetya malware that ravaged networks across the world. To initially set up its data-destroying, self-spreading code on its victims’ machines, Sandworm hijacked the replace mechanism of MEDoc, a typical piece of Ukrainian accounting software program. However past infecting tons of of Ukrainian corporations and authorities companies, NotPetya additionally unfold far past Ukraine’s borders, inflicting $10 billion in harm to corporations together with Merck, FedEx, Maersk, Mondelez, in addition to paralyzing updates to medical document techniques in hospitals throughout the US and inflicting severe collateral harm to Russian companies, too.
The indictment accuses Andrienko, Detistov, Frolov, and Pliskin particularly of growing completely different elements of the NotPetya malware. It goes as far as to state that Andrienko and Pliskin “celebrated” after the malware was deployed.
Regardless of US and EU sanctions in opposition to Russia for NotPetya, no hackers have been criminally charged with the worldwide cyberattack, and even named as individually chargeable for it, till now. That obvious inaction led many within the cybersecurity world to marvel for years at Western governments’ failure to carry Sandworm accountable. “NotPetya tested the red lines of the West, and the result of the test was that there are no red lines yet,” Johns Hopkins professor of strategic research Thomas Rid told WIRED in 2018. “The lack of any proper response is almost an invitation to escalate more.”