Russian intelligence services can gain access to a computer using broken software that users download, warned the State Service for Special Communications. Typically, such software is distributed through torrent trackers, which is actively used by attackers..
“Hackers trojanize ISOs and installation files and make them freely available on torrent trackers. If the victim downloads and installs such files on their computer, the hackers gain access to the content and may go unnoticed for a long time,” the report says..
Gosspetssvyaz explained that in many countries that were previously part of the USSR, system administrators still use unlicensed software in institutions and companies of various forms of ownership.. By installing software from torrents, as noted by the state service, users actually provide access to the Russian special services to the contents of working devices.
“It is especially dangerous to use a broken operating system, because in this case, attackers have full administrative access to the computer on which it is installed.. Ordinary Ukrainian users are also at risk by installing unlicensed software from unofficial sources, in particular, torrent,"
[see_also ids\u003d"
Earlier it was reported that Russian hackers are preparing a new wave of cyber attacks against Ukraine, including a threat in the form of consumer programs for organizations serving Ukrainian supply lines.. A report created by Microsoft's Cybersecurity Research and Analysis Group outlines a series of new findings about how Russian hackers operated during the war in Ukraine and what could happen next..