Pro-Ukrainian Hackers Claim Responsibility for Disrupting Russian Air Travel

Aeroflot Faces Major Disruption Following Suspected Cyberattack

On Monday, Aeroflot, Russia’s largest airline, experienced significant operational disruptions, cancelling approximately 40 flights due to what the airline referred to as a “technical failure.” However, multiple reports, aided by statements from Russian lawmakers and pro-Ukrainian hackers, have suggested that the root cause may have been a cyberattack.

The disturbances reverberated throughout Russia’s air traffic system, with many additional flights delayed. The online departure board at Sheremetyevo International Airport indicated widespread flight interruptions, stranding travelers at various airports. While the cancellations were primarily affecting domestic routes, international flights to destinations such as Minsk, the capital of Belarus, and Yerevan, Armenia, were also impacted.

Russian prosecutors confirmed to Reuters that the incident was indeed tied to a cyber intrusion, prompting a criminal investigation into the circumstances. Anton Gorelkin, a member of the Russian parliament, indicated that the country might be embroiled in a digital conflict, possibly instigated by hacktivists supported by hostile nations.

Pro-Ukrainian hacker groups have claimed responsibility for the attack, with one group named Silent Crow announcing on Telegram that they successfully accessed Aeroflot’s complete database, which included historical flight data, recorded audio, internal communications, and surveillance footage. The group estimated that recovery efforts could cost Aeroflot tens of millions of dollars and suggested that the repercussions could strategically compromise the airline’s operations.

Silent Crow, alongside another group known as the Belarusian Cyberpartisans, stated that the cyber assault was the culmination of a yearlong infiltration campaign. The attackers allegedly breached Aeroflot’s network, compromising approximately 7,000 servers and gaining access to personal computers of employees, including those of senior management.

From a cybersecurity perspective, the techniques employed in this attack could potentially align with several tactics outlined in the MITRE ATT&CK framework. Initial access may have been achieved through methods such as phishing or exploiting software vulnerabilities. The attackers likely established persistence within the network, maintaining their foothold while escalating privileges to access sensitive systems.

This incident serves as a stark reminder for organizations worldwide about the escalating threats posed by cyberattacks, particularly from motivated hacktivist groups. Business owners should stay vigilant and consider implementing robust cybersecurity measures to mitigate risks arising from potential breaches and unauthorized access. The implications of such incidents can be far-reaching, affecting not only operational capabilities but also brand reputation and financial stability.

Source