• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Is it time you switched to Database-as-a-Service?

      In this webinar learn how to leverage the advantages of in-VPC deployment, multi-cluster management, hybrid cloud replication, and more, all while delivering operational transparency and low TCO.

      • Date: 13 Apr 2021
      • Computing UK, London
      event logo
      How to overcome your Active Directory consolidation challenges

      In this web seminar we explore how best to go about assessing and modernising your AD as we reveal our research findings into AD health and readiness, consolidation challenges, and strategies for success.

      • Date: 20 Apr 2021
      event logo
      DeskFlix: DevOps

      Join us for this season of Deskflix: DevOps to hear from industry experts, leading partners, and your peers on all of the above. Available live or on-demand you’ll learn about best practice, the most common challenges, and gain valuable lessons on how to approach your 2021 DevOps journey.

      • Date: 21 Apr 2021
      event logo
      Desklix: Digital Workplace

      The Coronavirus pandemic has had a huge impact on our lives with most organisations making a sudden switch to mass remote working. As restrictions are progressively eased, the impact continues, with organisations having to decide when to allow staff back into offices, what proportion of remote working should be expected, and how all of this should be supported.Take part in this virtual event to put your questions to the experts, and see what your peers have learnt from the pandemic, and how they plan to apply this understanding to 2021 and beyond.

      • Date: 12 May 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Threats and Risks

Russia's new cyber laws will fuel online crime, claims report

Russia's Sovereign Internet law looks to re-model the country's self-contained internet system on China's

Cyber criminals in Russia are protected if they avoid attacks within Russia and the CIS
Cyber criminals in Russia are protected if they avoid attacks within Russia and the CIS
  • Dev Kundaliya
  • 09 August 2019
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Russia's new cyber laws will fuel additional online crime across the world by threat groups - both state-linked and criminal - operating out of Russia.

That's according to the latest report by cyber intelligence firm IntSights, which analyses the implications of Russia's upcoming internet laws, particularly its 'Sovereign Internet' law, on consumers, businesses, and cyber crime.

The report, entitled "The Dark Side of Russia: How New Internet Laws & Nationalism Fuel Russian Cybercrime", claims that Russia's new internet laws, which will come into effect on 1st November, will make it difficult for companies operating in Russia to protect both their communications and the privacy of their customers.

In April, Russia's State Duma approved the controversial Sovereign Internet bill, which empowers the government to create a Chinese-style standalone internet infrastructure. This could be used to cut the country off from the global internet, while continuing to function internally. 

The government will still likely turn a blind eye to threat actors that target foreign entities

Developing such a network will cost around $470 million, according to government estimates, at a time with one-in-ten city dwellers don't even have indoor sanitation. 

To enable the Sovereign Internet bill to deliver on its promises, ISPs in the country will be forced to direct all internet traffic through internet exchanges located in Russia, whith will be continuously monitored.

The new law will also affect cyber criminals working in Russia. The underground cyber crime landscape in Russia enjoys the tacit protection of the authorities, who in many cases turn a blind eye to hackers as long as they don't target individuals or organisations in Russia and the CIS. 

After the Sovereign Internet law comes into effect, hackers operating within Russia will need to ensure that the services they use to cover their tracks, such as virtual private networks, are either Russian or conform to strict sovereign internet requirements.

"The sovereign internet will make it much easier for Russian law enforcement to crack down on hackers that target Russian entities," explains Andrey Yakovlev in the IntSights' report.

"But the government will still likely turn a blind eye to threat actors that target foreign entities - particularly those operating in enemy states, like the United States."

The policy will make it even easier for the authorities in Russia to apprehend groups that carry out attacks within Russian and the CIS, encouraging more activity against people and organisations outside Russia.  

Just earlier this week, Microsoft warned that it a hacking group linked to the Russian state was targeting Internet-of-things devices in a bid to breach secure corporate networks.

Last month, cyber security researchers said they had discovered a new "highly targeted" form of mobile malware, dubbed 'Monokle', with links to Russian cyber criminals. 

And a report out this week that focused on China's APT41 indicated that hackers employed by the Chinese state for the purpose of online espionage also have a penchant for conducting cyber crime for their own benefit at night. 

Further reading

Russian hackers spark yet another Adobe Flash zero day security flaw warning
  • Security
  • 16 October 2015
Russian hackers breach Pentagon email system
  • Government
  • 07 August 2015
Microsoft and Adobe zero-day flaws used by Russian hackers to infiltrate sanctions discussions, claims FireEye
  • Security
  • 20 April 2015
Russian hackers targeting IoT devices to penetrate corporate networks, warns Microsoft
  • Threats and Risks
  • 06 August 2019
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Threats and Risks
  • Sovereign Internet Law
  • cyber laws
  • IntSights
  • Russian hackers
  • Russia
  • cyber crime
  • Andrey Yakovlev

More on Threats and Risks

Apple releases urgent security patch for zero‑day bug under active attack
Apple releases urgent security patch for zero‑day bug under active attack

The bug exists in Webkit, the browser engine which powers the Safari browser across all Apple devices

  • Threats and Risks
  • 29 March 2021
BlackKingdom ransomware attacking Microsoft Exchange servers via ProxyLogon vulnerabilities
BlackKingdom ransomware attacking Microsoft Exchange servers via ProxyLogon vulnerabilities

Patching the bugs will not remove a hacker who has already compromised a server, according to Microsoft

  • Threats and Risks
  • 23 March 2021
Researchers identify over 4,200 publicly reachable D/TLS servers that can be abused to launch DDoS attacks
4,200 vulnerable D/TLS servers that can be abused to amplify DDoS attacks by 37 times spotted by researchers

Citrix has updated its Netscaler ADCs and advises customers to upgrade

  • Threats and Risks
  • 19 March 2021
Boris Johnson: Britain must build cyber capability to stay ahead of enemies
Boris Johnson: Britain must build cyber capability to stay ahead of enemies

The PM is due to present a long-term Integrated Review of national security, defence, development and foreign policy to Parliament tomorrow

  • Threats and Risks
  • 15 March 2021
At least 10 hacking groups are currently exploiting Microsoft Exchange flaws
At least 10 hacking groups are currently exploiting Microsoft Exchange flaws, report

Attackers pile in after vulnerabilities revealed

  • Threats and Risks
  • 11 March 2021
blog comments powered by Disqus
Back to Top
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Privacy Settings
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading