❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayCybersecurity

Operation BURGAZADA: Russian-Born Couple Charged with Espionage in Australia

By: Alan J
13 July 2024 at 07:29

Operation BURGAZADA- Russian Born Espionage in Australia

Australian authorities have charged a Russian-born couple with espionage in a operation referred to as 'Operation BURGAZADA', which the first use of new anti-espionage laws introduced in 2018. Kira Korolev, 40, a private in the Australian Army, and her husband Igor Korolev, 62, a laborer, face allegations of stealing sensitive Defense Force material for Russian intelligence. The couple, who arrived in Australia a decade ago and became citizens in recent years, appeared before a Brisbane magistrate on Friday. They could face up to 15 years in prison if convicted. The case has raised questions about the screening process for military recruits and the ongoing threat of foreign espionage.

Operation BURGAZADA Investigation

The AFP's investigation into the couple's activities is ongoing, with authorities seeking to determine whether the information was handed over to Russian authorities. Australian Security Intelligence Organisation (ASIO) director-general Mike Burgess has warned foreign spies that "when we can support a prosecution, we will support a prosecution. [caption id="attachment_81624" align="alignnone" width="1324"]Operation BURGAZADA- Russian Born Espionage in Australia 2 Press-conference in relation to the investigation (Source: spaces.hightail.com)[/caption] Barrister Dylan Kerr, a commissioner from the Australian Federal Police, filed an application for the suppression of five names related to the case for national security reasons. The Defence Force has responded to these allegations by cancelling the couple's access to defence bases and systems. Court documents reveal that Kira Korolev is accused of providing unlawful access to defense computer systems, copying and disseminating information, and maintaining relationships with Russian Federation intelligence services. The alleged activities date back to December 2022 and continued until their arrest on July 11, 2024. Australian Federal Police Commissioner Reece Kershaw said Kira Korolev, an information systems technician with a security clearance, allegedly traveled to Russia in 2023 while on leave. During this time, she reportedly instructed her husband on accessing defense systems using her work account from their Brisbane home. A caretaker of the apartment block where the couple resided, Blake Fraser, stated that he had not noticed any suspicious activity from the couple. He stated, β€œI kept my eye out for anything unusual, but honestly, even being here on-site, I never saw anything.” He said that he only received his first hint that something was off when the apartment had received a request from ASIO and the AFP to access its F block, later being greeted by police cars and officers who arrived to arrest the couple. β€œI certainly wouldn’t think that in my lifetime something like this would have happened,” Fraser exclaimed.

Official Response and Implications

The arrests resulted from a joint operation involving the Australian Security Intelligence Organisation (ASIO) and the Australian Federal Police. ASIO Director-General Mike Burgess stated that the Defense Force's security awareness allowed early intervention and control of the operation. Authorities are investigating whether Kira Korolev joined the Defense Force with the intention of committing espionage or if the couple had been recruited more recently into Russian intelligence. The case has prompted a review of vetting procedures for military personnel, especially those born overseas. While officials claim no significant security compromise has been identified, the incident highlights the ongoing challenges of countering foreign espionage. Mike Burgess, Director-General of the Australian Security Intelligence Organisation encouraged potential Russian spies to defect and share secrets, using the famous example of the 1954 Petrov defections, whereΒ  Soviet spies who posed as Russian diplomats had defected to Australia. Burgess stated, β€œIf you want to share your secrets, please reach out”. [caption id="attachment_81629" align="alignnone" width="980"]Operation BURGAZADA 1954 Petrov defections Russian Australia Vladimir Petrov and Evdokia Petrov who defected to Australia in 1954 (Source:www.naa.gov.au)[/caption] The Federal Police Commissioner Kershaw stated that no other individuals had been identified so far in the investigation, while investigators are also working to assess if the couple had established any rapport with any Russian diplomats based in Australia. Court documents allege the couple maintained a relationship with members or affiliates of Russian intelligence services for the purpose of providing the information. Kershaw expressed confidence in the counter-intelligence capability of the Australian government and the Five Eyes. He stated:
β€œOur Five Eyes partners and the Australian government can be confident that the robust partnerships within the Counter Foreign Interference Taskforce mean we will continue to identify and disrupt espionage and foreign interference activity.”
Prime Minister Anthony Albanese emphasized that any individuals interfering with Australia's national interests will be held accountable.

US Busts Russian AI-Driven Disinformation Operation – Source: www.databreachtoday.com

us-busts-russian-ai-driven-disinformation-operation-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Meliorator Software Generates Social Media Bots David Perera (@daveperera) β€’ July 9, 2024 Β  Β  Affiliates of the Russian propaganda network RT helped build and run an AI-driven social media disinformation operation. (Image: Shutterstock) U.S. […]

La entrada US Busts Russian AI-Driven Disinformation Operation – Source: www.databreachtoday.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

NATO Faces Escalating Cyberthreats: From Espionage to Disinformation

NATO

As NATO leaders convene in Washington, D.C. for the organization's 75th Anniversary summit, a hidden war rages on – a relentless campaign of cyberattacks targeting the Alliance and its members.

This threat landscape is not merely a static backdrop, but a dynamic battlefield where adversaries employ a growing arsenal of tactics, from stealthy espionage to disruptive cyberattacks and disinformation campaigns, a report from Google-owned cybersecurity firm Mandiant said.

Espionage Actors Set Their Sights on Alliance Secrets

Nation-state actors like APT29 (ICECAP), attributed to Russia's SVR intelligence service, are notorious for targeting NATO members. These actors excel at compromising networks, often through social engineering or exploiting zero-day vulnerabilities, to steal sensitive political, diplomatic, and military intelligence. Their ability to operate undetected within compromised environments makes them particularly troublesome adversaries, Mandiant said.

China's cyber espionage efforts have also become more sophisticated, transitioning from loud operations to stealthier techniques. These actors exploit network edges and leverage complex infrastructure like operational relay box networks to mask their activities and hinder detection. Additionally, they increasingly rely on "living off the land" techniques, using legitimate system tools for malicious purposes, further complicating defenders' ability to identify intrusions.

Beyond Espionage: Disruptive and Destructive Attacks

Disruptive and destructive cyberattacks pose a direct threat to NATO's operational capabilities. Iranian and Russian actors have demonstrated a willingness to launch such attacks, often masking their involvement behind hacktivist groups. For instance, the destructive 2022 attack on Albania, initially attributed to "HomeLand Justice" hacktivists, was later linked to Iranian state actors. These incidents highlight the growing risk of attacks targeting critical infrastructure that could cripple essential services for NATO members.

Hacktivists and criminal actors further complicate the threat landscape. The global resurgence of hacktivism, fueled by geopolitical flashpoints like the Ukraine war, has resulted in a surge of attacks against NATO members. While these operations often lack sophistication and lasting impact, they can garner significant media attention and sow discord. Additionally, some hacktivist groups, like the pro-Russian Cyber Army Russia Reborn (CARR), are experimenting with more disruptive tactics, targeting critical infrastructure such as water supplies.

Financially motivated cybercrime, particularly ransomware attacks, pose a significant threat to critical infrastructure across NATO states. Healthcare institutions have become prime targets, disrupting patient care and highlighting the potential for widespread societal consequences. The ability of cybercriminals to operate with impunity from lax jurisdictions and the lucrative nature of ransomware attacks suggest this threat will only escalate.

Disinformation: A Weapon to Sow Discord

Information operations, encompassing social media manipulation and complex network intrusions, have become a hallmark of modern cyberwarfare. Russian and Belarusian actors have heavily targeted NATO with disinformation campaigns aimed at undermining Alliance unity and objectives. These efforts range from social media manipulation by "troll farms" to the coordinated leaking of stolen information.

In fact, on the same day as Mandiant released this report, the U.S. Department of Justice disrupted a Russia-run AI-enabled Twitter disinformation bot farm. Almost 1,000 accounts were seized. These bots masqueraded as Americans and promoted Russian government narratives.

Countering such campaigns requires collaboration between governments and the private sector, with tech giants like Google actively removing malicious content and disrupting information operations.

A Collective Defense is Paramount

A senior NATO official on Tuesday during the NATO Summit said Russia can sustain its war economy for 3-4 more years. "Ultimately, we all have to be prepared to continue to support Ukraine well beyond 2025. This is certainly something that we all understand very well," the official added.

The cyber threat landscape facing NATO is vast and ever-evolving. Unlike traditional warfare, cyberattacks can persist irrespective of broader geopolitical tensions. The war in Ukraine has undoubtedly emboldened reckless cyber activity against NATO allies, highlighting the need for a collective defense strategy. To effectively counter these threats, NATO must leverage the technological expertise of the private sector and foster strong partnerships with its member states. Only through a united front can the Alliance seize the initiative in cyberspace and secure its future.

❌
❌