In recent discussions aired on radio, experts warned that malicious activity targeting Russian computer networks is increasing. Attacks include unauthorized access to systems and the deployment of viruses once access is gained. Grigory Pashchenko, head of the CyberMoscow project, outlined how attackers are building so-called zombie nets that could be used for large-scale assaults on government agencies and key institutions. [Sputnik]
The expert noted that the most damaging trend involves using a computer’s operating system to strike the servers of major Russian companies and public services, including Gosuslugi, the state services portal. As global narratives about Russia accumulate, there has also been a rise in the sale of botnets, or zombie networks, which criminals trade to power further attacks. [Sputnik]
Pashchenko described how hackers are increasingly stealing personal data from residents, then gathering more information to facilitate blackmail. He also reported a surge in ransomware variants that render machines unusable until a ransom is paid. In contrast, covert cryptocurrency mining on ordinary citizens’ devices appears to be dwindling, reportedly because the activity is easier to detect and interrupt. [Sputnik]
The discussion also touched on legal developments within Russia’s ministry framework. There is mention of plans to regulate the activities of cybersecurity professionals who operate with ethical intent, sometimes referred to as “white hat” hackers, in an effort to strengthen defense while curbing unlawful exploitation of vulnerabilities. [Sputnik]
The growing threat landscape highlights how connected tools and services move risk across borders. As cybercriminals adapt, organizations and individuals alike are urged to adopt layered security measures, keep software up to date, and maintain robust backup practices. Monitoring and rapid incident response are emphasized to minimize damage when breaches occur, and to preserve critical services during cyber incidents. [Sputnik]
Experts stress cooperation among government agencies, private sector groups, and international partners to share threat intelligence, coordinate responses, and reduce the time between detection and containment. By understanding common attack methods, such as botnet-powered distributed denial of service campaigns, organizations can implement defensive controls, including network segmentation, strong authentication, and anomaly detection that can spot unusual patterns in traffic. [Sputnik]
In summary, the cyber threat environment described by Pashchenko underscores a shift toward more sophisticated, automated, and financially motivated cybercrime. The dialogue emphasizes not only technical safeguards but also policy steps designed to cultivate lawful, ethical cybersecurity work while countering criminal misuse of digital tools. [Sputnik]