|By Pavel Polityuk1/2
|By Pavel Polityuk
|By Pavel Polityuk2/2
|By Pavel Polityuk
By Pavel Polityuk
KIEV (Reuters) - Ukraine said on Saturday that Russian security services were involved in a recent cyber attack on the country, with the aim of destroying important data and spreading panic.
The SBU, Ukraine's state security service, said the attack, which started in Ukraine and spread around the world on Tuesday, was by the same hackers who attacked the Ukrainian power grid in December 2016. Ukrainian politicians were quick to blame Russia for Tuesday's attack, but a Kremlin spokesman dismissed "unfounded blanket accusations".
- PHOTOS: Blues dump Bruins to win Stanley Cup after agonizing 52-year wait40 Pictures
- PHOTOS: This Pakistani waiter looks just like Peter Dinklage8 Pictures
Cyber security firms are trying to piece together who was behind the computer worm, dubbed NotPetya by some experts, which conked out computers, hit banks, disrupted shipping and shut down a chocolate factory in Australia.
The attack also hit major Russian firms, leading some cyber security researchers to suggest that Moscow was not behind it.
The malicious code in the virus encrypted data on computers, and demanded victims pay a $300 ransom, similar to the extortion tactic used in a global WannaCry ransomware attack in May. But Ukrainian officials and some security experts say the ransomware feature was likely a smokescreen.
Relations between Ukraine and Russia went into freefall after Moscow's annexation of Crimea in 2014 and the subsequent outbreak of a Kremlin-backed separatist insurgency in eastern Ukraine that has killed more than 10,000 people.
Hacking Ukrainian state institutions is part of what Ukraine says is a "hybrid war" by Russia on Kiev. Russia denies sending troops or military equipment to eastern Ukraine.
"The available data, including those obtained in cooperation with international antivirus companies, give us reason to believe that the same hacking groups are involved in the attacks, which in December 2016 attacked the financial system, transport and energy facilities of Ukraine using TeleBots and BlackEnergy," the SBU said.
"This testifies to the involvement of the special services of Russian Federation in this attack."
The SBU in an earlier statement on Friday said it had seized equipment it said belonged to Russian agents in May and June to launch cyber attacks against Ukraine and other countries.
Referencing the $300 ransomware demand, the SBU said "the virus is cover for a large-scale attack on Ukraine. This is evidenced by a lack of a real mechanism for taking possession of the funds ... enrichment was not the aim of the attack."
"The main purpose of the virus was the destruction of important data, disrupting the work of public and private institutions in Ukraine and spreading panic among the people."
A cyber attack in December on a Ukrainian state energy computer caused a power cut in the northern part of the capital Kiev.
The Russian foreign ministry and Federal Security Service did not immediately respond to requests for comment on the latest allegations.
Russian oil major Rosneft <ROSN.MM> was one of the first companies to reveal it had been compromised by the virus and sources told Reuters on Thursday computers at state gas giant Gazprom <GAZP.MM> had also been infected.
The SBU's accusations chime with some of the findings of the cyber security firm ESET in Slovakia, which said in research published online on Friday that the Telebots group -- which has links to BlackEnergy -- was behind the attack.
"Collecting ransom money was never the top priority for the TeleBots group," it said, suggesting Ukraine was the target but the virus spread globally as "affected companies in other countries had VPN connections to their branches, or to business partners, in Ukraine."
"The TeleBots group continues to evolve in order to conduct disruptive attacks against Ukraine," it said.
"Prior to the outbreak, the Telebots group targeted mainly the financial sector. The latest outbreak was directed against businesses in Ukraine, but they apparently underestimated the malware' spreading capabilities. That's why the malware went out of control."
(Additional reporting by Alexander Winning in Moscow and Jim Finkle in Toronto; writing by Matthias Williams; Editing by Jeremy Gaunt)