KillNets Kremlin Connection Unclear as the Cybercrime Collective Grows

  /     /     /  
Publicated : 23/11/2024   Category : security


KillNets Kremlin Connection Unclear as the Cybercrime Collective Grows


KillNet is amassing members, capabilities, and know-how, as it looks to consolidate cybercrime power under its own umbrella.



Although the precise connection between Russian threat group KillNet and the Kremlin remains nebulous, its high-profile, and increasingly effective, cyberattacks continue to align with Russian state interests. And its churning PR campaign is luring fellow cybercriminals, and their skills, into the operation.
A new report out this week from Mandiant finds
KillNets media branding strategy
 is working, helping the group to consolidate Russian hacker power under one organization.
Its worth noting, as other analysts have noted, that beyond mirroring Kremlin-interests following the Ukraine invasion, there is little hard evidence of coordination between KillNet and the Russian government. However, in an environment rife with disinformation, facts can be hard to follow, and the Mandiant report comes on the heels of a
UK warning about cybercrime mercenaries
teaming up with governments to become state proxies.
North Korea has for some time used cybercrime to steal funds and more recently cryptocurrency, UK National Crime Agency director Graeme Biggar said in the statement. The Russian state has long tolerated and occasionally tasked the cybercrime groups on its territory and had links with its oligarchs and their enablers. But over the last year we have begun to see hostile states beginning to use organized crime groups — not always of the same nationality — as proxies. It is a development we and our colleagues in MI5 and CT [counter-terrorism] policing are watching closely.
KillNet may or may not be part of the phenomenon. We have not uncovered direct evidence of the [KillNet] collectives collaboration with, or direction from, the Russian security services, but Russia and many other nations have leveraged proxies in their operations to obfuscate attribution, Mandiants Threat Intelligence Team told Dark Reading in a media statement.
It might be motivated by geo-political events, but 
KillNet is a business
faced with an increasingly crowded Russian cybercrime sector, so it has a particular focus on differentiating the brand with legend making in the press.
In the past there wasnt much technological fire power behind KillNet attacks. KillNets distributed denial of service (DDoS) attacks have been
splashy
, focused largely on NATO
interests in the US
and Europe but did little long-term damage to its targets. That changed in June when
Anonymous Sudan
joined the wider
KillNet
collective for a June cyberattack that was able to successfully
disrupt Microsoft services
. This has allowed the collective to have a broadening circle of influence in the cybercrime underground.
Mandiant assesses with moderate confidence that the collectives regular creation and absorption of new groups is at least partially an attempt to continue to garner attention from Western media and to enhance the influence component of its operations, Mandiant said. Anonymous Sudans successful disruption of Microsoft services in June 2023 marked a significant increase in observed capabilities of the KillNet collective, which had previously struggled to impact claimed targets of previous operations.
Anonymous Sudan emerged in January, and by the following month had joined under the KillNet collective, Mandiants team tells Dark Reading.
Even in the short period before this official declaration, Anonymous Sudan displayed overt support for KillNet and its operations, Mandiants statement to Dark Reading explains. Nearly 50% of Anonymous Sudans attacks have been on US, European, and other pro-Ukraine organizations, despite its
claimed focus on Sudans issues
.As the KillNet messaging machine churns on, Timothy Morris, chief security advisor at Tanium, tells Dark Reading he expects more Russian hackers will be joining the effort.
Since KillNet was transformed from a DDoS-as-a-service attack tool to a threat actor group, they have been vocal, Morris says. So their PR game is a key component to attempt to instill fear and show their allegiance to Russian objectives. The collective of the affiliates that make up KillNet is also growing. There have been spin-offs, but the support of other DDoS groups, like Anonymous Sudan, has shown that theyve struck a chord with other groups.
Callie Guenther, threat researcher with Critical Start, wonders whether the new boost in KillNets capability is, in fact, a sign its getting new outside help, such as from the Kremlin. But in any event, she warns that its cybercrime arsenal might soon back up the groups self-hype.
Its clear that KillNet, including its affiliate group Anonymous Sudan, is exhibiting increasingly sophisticated capabilities, suggesting potential backing from more experienced or resourced actors, Guenther tells Dark Reading in response to the Mandiant report.
Overall, the developments suggest that KillNet, along with its affiliates, is growing in sophistication and ambition, targeting high-profile organizations like Microsoft and NATO, and consistently aligning with Russias geopolitical interests, Guenther adds. This points to a more significant threat than a mere PR campaign.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
KillNets Kremlin Connection Unclear as the Cybercrime Collective Grows