IT Army of Ukraine targeted Russian energy concern Gazprom in hack-and-leak operation in January 2023
description
The IT Army of Ukraine targeted the Russian energy concern Gazprom in a hack-and-leak operation in January 2023, according to a Telegram statement on January 29, 2023. They allegedly gained access to more than 6.000 files of the Gazprom group of companies regarding financial and economic activities.
sources attribution
Not available
sources politicalization
Not available
start
01.01.2023
end
29.01.2023
source incident detection disclosure
Incident disclosed by attacker
receiver
label:
Gazprom
category:
Critical infrastructure
Energy
country:
Russia
inclusion criteria
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals
added to database
06.03.2023
attribution date
29.01.2023
attribution basis
Attacker confirms
attributing country
Ukraine
attributing actors
IT Army of Ukraine
attribution type
Self-attribution in the course of the attack (e.g., via defacement statements on websites)
initiators
label:
IT Army of Ukraine
category:
Non-state-group
Hacktivist(s)
countries:
Ukraine
legal attribution references
Not available
Incident/Operation Type
Data theft & Doxing
data theft
Not available
disruption
Not available
hijacking
Not available
Physical Effects (temporal)
Not available
Physical Effects (spatial)
Not available
unweighted cyber intensity
0
Target / Effect Multiplier
Not available
weighted cyber intensity
Not available
MITRE: Initial Access
Not available
MITRE: Impact
Not available
Common Vulnerability Scoring System: User Interaction
Not available
Zero Day
Not available
cyber conflict issue
System / ideology
Territory
Resources
International power
offline conflict issue
System/ideology
Russia – Ukraine
Territory
Russia – Ukraine
Resources
Russia – Ukraine
International power
Russia – Ukraine
offline conflict intensity
Yes / HIIK intensity
HIIK 5
casualties
No casualties as a direct result of the cyber incident
political response
Not available
date:
Not available
countries:
Not available
actors:
Not available
type:
Not available
state responsibility indicator
None/Negligent
il breach indicator
Armed conflict
Due diligence
Sovereignty
response indicator
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
Evidence for Sanctions Indicator
Not available
legal response
Not available
date:
Not available
countries:
Not available
actors:
Not available
type:
Not available
impact indicator
Impact Indicator:
Minor
Functional Impact:
No system interference/disruption
Intelligence Impact:
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
Political impact (Affected entities):
Not available
Political impact (Third Countries):
1-10
Political Impact:
1-10
Economic Impact:
Not available