Hackers compromised the Russian Federal Security Service (FSB) servers where they gained access to 7.5 terabytes of data from a major FSB contractor named “Sytech”.
According to the Russian media, SyTech has been working with FSB since 2009, in particular, they contributed to several projects for FSB unit 71330 and for fellow contractor Quantum.
“Sytech” – The company is directed by Denis Vyacheslavovich Krayushkin. One of the clients of “Sytech” is the research institute “Kvant”, where, according to Runet-ID, Vyacheslav Krayushkin works as a scientific consultant.
Krayushkin has registered in the Moscow district of Zamoskvorechye.
The Bi-bi-s Research Institute “Quantum” refused to answer the question whether Denis and Vyacheslav Krayushkin were linked to the organization:
“This is confidential information, they are not ready to give it a voice”.
The company earned 40 million rubles ($635,000) from public contracts in 2018
The latest project is the development of Nalog-3 for the Main Scientific Innovation Implementation Center.
“According to the data received, the majority of non-public projects of Sytech were commissioned by military unit No. 71330, which allegedly is part of the 16th directorate of the FSB of Russia.” states the website CrimeRussia.”
This unit is engaged in electronic intelligence, experts form the International Center for Defense and Security in Tallinn believe.”
Intruders leaked the dozens of data that related to non-public Internet projects such as how Russia trying to de-anonymization of users of the Tor browser, collecting information about users of social networks, and isolate the Russian internet operation from rest of the world.
The hacking attempt took place on July 13, 2019, by 0v1ru $, an unknown hacking group who have recently created their Twitter account where they posted screenshots of the folder “Computer” allegedly belonging to the victim.
Among the different pictures that they posted in the Twitter account, one picture indicates the total amount of information – 7.5 terabytes.
During the attack, Hackers defaces the FSB contractor site “Sytech” and changes the image with a wide smile and smugly squinting eyes called “Yoba-face”.
Along with this image, hackers also posted an interface of the internal network, later sent those documents to another hacking group called DigitalRevolution who shared those data to journalists of several publications in Russia.
Secret Projects that listed in Stolen Data
The project called Nautilus-S that was developed by SyTech in 2012 by request of the Research Institute “Kvant” to de-anonymize users of the Tor browser.
“One of the results of this work was to be “a database of users and computers actively using Tor networks,” BBC Reported by according to documents merged by hackers.
Unlike the previous project, Nautilus named without C developed a period of work (2009-2010) and their cost (18.5 million rubles) is to planned to collect data on social networks such as Facebook, MySpace and LinkedIn.
A project that woked by SyTech during the period of 2013-2014, in which Saitek tried to find a vulnerability in the BitTorrent network protocol.
According to the Document Sytech had to explore “the possibilities of developing a complex of penetration and covert use of peer-to-peer and hybrid networks,”
SyTech’s other project called “Mentor” was designed for 2013-2014, to monitor email at the customer’s choice.
“According to the documentation provided by the hackers, the Mentor program can be configured so that it checks the mail of the required respondents at a specified time interval or collects the “mining group” using the specified phrases.”
Website “Sytech ( https://www.sytech.ru/ )” is not available – neither in its previous form nor in the version with “Yob-face”. BBC reported.
5.Hope/Nadezhda – a project to analyzed the overall Russian internet and its connections to the global WWW.
6.Tax-3 – a project to allow you to manually remove from the information system of the FTS data of persons under state protection.
Researchers identified 25 malicious servers, 18 of which were located in Russia, and running Tor version 0.2.2.37, the same one detailed in the leaked files.