Russian officials warn of potential compromise of major tech services provider

Avatar

Russian cybersecurity authorities have warned local credit and financial businesses about a potential compromise involving subsidiaries of the country’s largest tech services provider, LANIT.

In an unusual public disclosure issued late last week, Russia’s National Coordination Center for Computer Incidents (NCCCI) stated that the incident likely affected the information infrastructure of two LANIT companies specializing in payment services and supplying software for banking equipment and automated teller machines (ATMs).

Moscow-based LANIT operates across multiple sectors, including software development, cybersecurity and system integration. It is a key contractor for Russian state entities, including the Ministry of Defense and major defense and aerospace corporations. The company was sanctioned by the U.S. in 2024 in an effort “to degrade Russia’s ability to sustain its war machine.”

In a statement on Friday, the NCCCI urged LANIT’s customers to change passwords and access keys for systems hosted on the company’s data servers. It also recommended that any entities using LANIT’s software or products, particularly those with remote access granted to the company’s engineers, update their access credentials.

“If you detect any signs of a compromise in your organization’s information infrastructure, please report them to the NCCCI,” the agency said.

Although details about the breach remain scarce, the fact that Russian authorities have publicly acknowledged a potential cyberattack on a state contractor is significant in itself. LANIT has not commented on the potential compromise of its systems. The threat actor behind the alleged attack is unknown.

This is one of the latest cyber incidents affecting Russian companies in the financial and banking industries. The majority of these attacks have been claimed by hackers linked to Ukraine.

Earlier in December, Ukraine’s military intelligence agency (HUR) reported launching a powerful distributed denial-of-service (DDoS) attack on one of Russia’s largest privately owned banks, Gazprombank, disrupting its online and mobile banking services. Following the alleged attack, Russian users reported difficulties accessing Gazprombank services.

In July, several large Russian banks reported suffering DDoS attacks that temporarily disrupted their mobile apps and websites. These attacks were also claimed by Ukraine’s intelligence.

In an incident publicized in October, two groups of pro-Ukrainian hackers and Ukraine’s security service (SBU) claimed to have breached Russia’s largest private bank, Alfa-Bank. In January, attackers involved in the Alfa-Bank hack released data they claimed belonged to 30 million bank customers.

NewsCybercrimeIndustryGovernment
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Siberia’s largest dairy plant reportedly disrupted with LockBit variant

Next Post

London member of ‘Com’ network convicted of making indecent images of children

Related Posts

eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the eSIM technology used in modern smartphones, exposing users to severe risks. The issues impact the Kigen eUICC card. According to the Irish company's website, more than two billion SIMs in IoT devices have been enabled as of December 2020. The findings come from Security Explorations, a research lab
Avatar
Read More

Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three flaws is as follows - CVE-2024-13915 (CVSS score: 6.9) - A pre-installed "com.pri.factorytest" application on Ulefone and
Avatar
Read More

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021. "He is wanted internationally for committing several cybercrimes (ransomware attacks, blackmail, and money laundering) against companies based in the Netherlands," officials said in a statement Monday. In conjunction with the
Avatar
Read More