Microsoft says ウクライナ共和国, Poland targetted with novel ransomware attack

By Zeba Siddiqui

SAN FRANCISCO, Oct 14 (Reuters) - A newly discovered 切り開く/タクシー/不正アクセスing group has attacked transportation and 兵たん業務 companies in ウクライナ共和国 and Poland with a novel 肉親,親類d of ransomware, Microsoft said in a blog 地位,任命する on Friday.

The 攻撃者s 的d a wide 範囲 of systems within an hour on Tuesday, Microsoft said, 追加するing that it hadn't been able to link the attacks to any known group yet.

顕著に, however, 研究員s 設立する that the 切り開く/タクシー/不正アクセスs closely mirrored earlier attacks by a ロシアの 政府-linked cyber team that had 混乱に陥れる/中断させるd ウクライナ共和国 政府 機関s.

ウクライナ共和国 has been the 的 of 非常に/多数の cyberattacks by Russia since the start of the 衝突 in late February, によれば western 安全 研究員s and 上級の 政府 公式の/役人s.

The ロシアの 大使館 in Washington did not すぐに 答える/応じる to a request for comment, and neither did the cybersecurity 機関s of ウクライナ共和国 or Poland.

犠牲者s of the new ransomware, 指名するd "Prestige," overlap with those of another data-shredding cyberattack that 伴う/関わるd the "FoxLoad," or "HermeticWiper" malware, Microsoft said.

That attack 攻撃する,衝突する hundreds of computers in ウクライナ共和国, Lithuania, and Latvia at the beginning of the ロシアの 侵略 of ウクライナ共和国.

"Prestige" ransomware 作品 by encrypting a 犠牲者s' data and leaving a 身代金 公式文書,認める that says the data can only be 打ち明けるd with the 購入(する) of a decryption 道具, Microsoft said.

In several 事例/患者s, the 研究員s 公式文書,認めるd that the hackers had 伸び(る)d 行政官/管理者 支配(する)/統制する of the 犠牲者s' systems ahead of (軍隊を)展開する,配備するing the ransomware, 示唆するing they had stolen their 信任状 earlier and were waiting for the 権利 moment.

"The 企業-wide (軍隊などの)展開,配備 of ransomware is not ありふれた in ウクライナ共和国, and this activity was not connected to any of the 94 現在/一般に active ransomware activity groups that Microsoft 跡をつけるs," the 研究員s said. (報告(する)/憶測ing by Zeba Siddiqui in San Francisco Editing by Alistair Bell)

Sorry we are not 現在/一般に 受託するing comments on this article.