KIEV (Reuters) - Hackers tried to access confidential data in powerful but stealthy phishing attacks launched in parallel with an eyeball-grabbing ransomware strike called BadRabbit last week, the head of the Ukrainian state cyber police said on Thursday.
The BadRabbit attack mainly affected Russia but also hit the headlines in Ukraine -- a frequent victim of cyber strikes -- by causing flight delays at Odessa airport on the south coast and disrupting electronic payments in the Kiev metro.
“During these attacks, we repeatedly detected more powerful, quiet attacks that were aimed at obtaining financial and confidential information,” cyber police chief Serhiy Demedyuk told the Reuters Cyber Security Summit in Kiev.
The discovery suggests Ukraine may have been a key target of last week’s attacks, despite the higher incidence of BadRabbit victims in Russia.
Demedyuk said it was a kind of “hybrid attack” that is becoming increasingly common. “There is an open, let’s say instantly obvious attack, while underneath there is a hidden, fairly well-thought-out attack, to which nobody pays attention.”
“The main theory we’re working on now, is that they (the perpetrators of both attacks) were one and the same,” he said. “The goal was to get remote and undetected access.”
The parallel attack targeted users of Russian-designed software called 1C with phishing emails that appeared to be from the developer, Demedyuk said.
1C’s developer did not immediately respond to a request for comment from Reuters.
A distributor of 1C in Ukraine, who asked not to be named, confirmed that customers had been targeted and said it had warned users to take extra precautions as a result.
Demedyuk said his department learned of the hack when about 15 companies reported that they had been compromised.
He said it was not yet possible to say how many people or firms or people had been affected in total, but 1C products, which include accounting software, are widely used in Ukraine.
Another virus, dubbed “NotPetya”, also targeted users of accounting software in June. It took down thousands of computers in Ukraine and spread around the world, disrupting shipping and businesses.
Security researchers and cyber experts believe the NotPetya and BadRabbit attacks could have been carried out by the same group as they share a key piece of code.
Demedyuk said Ukrainian authorities had prevented five other major attacks on financial institutions and strategic infrastructure since June, declining to name the targets.
In one of the attacks, police managed to block the transfer of 10 million hryvnia ($371,277) out of a company’s account.
He also said hackers have been exploiting so-called “back doors” that were installed by hackers during the NotPetya attack.
For more Reuters cyber news, go to www.reuters.com/cyberrisk
Follow Reuters Summits on Twitter @Reuters_Summits
Additional reporting by Jack Stubbs in Moscow; Editing by Matthias Williams and William Maclean