National Cyber Security Centre
UK condemns Russia's GRU over Georgia cyber-attacks
- Also published by:
- Foreign and Commonwealth Office
Foreign Secretary Dominic Raab calls out Russian campaign of unacceptable cyber-attacks against Georgia.
The UK, Georgia and international partners have exposed the GRU’s – Russia’s military intelligence service – responsibility for a number of significant cyber-attacks against Georgia last year.
The National Cyber Security Centre (NCSC) assesses with the highest level of probability that on 28 October 2019 the GRU carried out large-scale, disruptive cyber-attacks. These were against a range of Georgian web hosting providers and resulted in websites being defaced, including sites belonging to the Georgian Government, courts, NGOs, media and businesses, and also interrupted the service of several national broadcasters.
These cyber-attacks are part of Russia’s long-running campaign of hostile and destabilising activity against Georgia. The UK is clear that the GRU conducted these cyber-attacks in an attempt to undermine Georgia’s sovereignty, to sow discord and disrupt the lives of ordinary Georgian people. The UK remains unwavering in its support for Georgia’s sovereignty and territorial integrity.
The Foreign Secretary Dominic Raab yesterday said:
The GRU’s reckless and brazen campaign of cyber-attacks against Georgia, a sovereign and independent nation, is totally unacceptable.
The Russian Government has a clear choice: continue this aggressive pattern of behaviour against other countries, or become a responsible partner which respects international law.
The UK will continue to expose those who conduct reckless cyber-attacks and work with our allies to counter the GRU’s menacing behaviour.
Notes to Editors
The UK’s National Cyber Security Centre (NCSC) assess that the GRU was almost certainly (95% +) responsible for defacing websites, cyber-attacks and interruption to TV channels in Georgia in October 2019.
Further details on the framework used by the UK government for all source intelligence assessments, including the probability yardstick, are available here.
Given the NCSC’s assessment and the broader context, the UK government has made the judgement that the GRU was responsible.
The cyber programme responsible for these disruptions is known in open source variously as the Sandworm team, BlackEnergy Group, Telebots, and VoodooBear. It is operated by the GRU’s Main Centre of Special Technologies, often referred to by the abbreviation “GTsST” or its field post number 74455.
This is the first significant example of the GRU using cyber-attacks to disrupt or destroy since late 2017. This Unit of the GRU was responsible for:
- BlackEnergy: December 2015 shut off part of Ukraine’s electricity grid, with 230,000 people losing power for between 1 – 6 hours.
- Industroyer: December 2016 shut off part of Ukraine’s electricity grid, also known as CrashOverride. It resulted in a fifth of Kyiv losing power for an hour. It is the first known malware designed specifically to disrupt electricity grids.
- NotPetya: June 2017 destructive cyber-attack targeting the Ukrainian financial, energy and government sectors and affecting other European and Russian businesses
- BadRabbit: October 2017 ransomware encrypted hard drives and rendered IT inoperable. This caused disruption including to the Kyiv metro, Odessa airport, Russia’s central bank and two Russian media outlets
Georgia is a strategic partner to the UK. The UK supports a range of projects in Georgia and our annual Ministerial-level UK-Georgia Strategic Dialogue provides an important framework for continuing to develop our strong relationship. The UK was particularly grateful for Georgia’s firm support following the attack on Salisbury in 2018, including in efforts to strengthen the OPCW.
- Follow the Foreign Secretary Dominic Raab on Twitter @DominicRaab and Facebook
- Follow the Foreign Office on Twitter @foreignoffice and Facebook
- Follow the Foreign Office on Instagram, YouTube and LinkedIn
Newsdesk 020 7008 3100
Latest News from
National Cyber Security Centre
NCSC response to speculation about cyber attacks on UK coronavirus research30/11/2020 14:05:00
NCSC statement on the media reports suggesting that hackers have tried to break into the systems of researchers AstraZeneca and the University of Oxford.
Black Friday shoppers urged to avoid handing cyber criminals early Christmas gift24/11/2020 16:15:00
The NCSC has updated guidance ahead of Black Friday to help people shop online securely.
NCSC Takedown Service23/11/2020 10:20:00
Takedown services remove sites and block any attack infrastructure to limit the harm that cyber attacks can cause.
NCSC defends UK from more than 700 cyber attacks while supporting national pandemic response04/11/2020 16:15:00
The NCSC's fourth Annual Review reveals its ongoing work against cyber attacks, support for the UK during the coronavirus pandemic.
NCSC statement following US advisory on ransomware targeting of US health sector30/10/2020 16:15:00
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have published an advisory on the threat of Ryuk ransomware.
Code of Practice for Cyber Security and Safety in Engineering30/10/2020 12:43:00
The Institution of Engineering and Technology has published a Code of Practice with the support of the NCSC.
NCSC welcomes EU cyber sanctions against Russia following 2015 attack on Germany’s Parliament23/10/2020 13:15:00
EU cyber sanctions against Russia following a 2015 attack on Germany's Parliament have been welcomed by the NCSC.