“Not Petya” Cybervirus Attack, Attributed by CIA to Russia, Was Committed by Ukrainian

Originally published Sep 7, 2018

You may remember the cyberattack with the “Not Petya” virus, which our CIA immediately attributed to a branch of Russia’s GRU. Naturally the Washington Post and other MSM outlets trumpeted this far and wide.

Russian military was behind 'NotPetya' cyberattack in Ukraine, CIA concludes
https://www.washingtonpost.com/world/national-security/russian-military-...

The CIA has attributed to Russian military hackers a cyberattack that crippled computers in Ukraine last year, an effort to disrupt that country's financial system amid its ongoing war with separatists loyal to the Kremlin.

The June 2017 attack, delivered through a mock ransomware virus dubbed NotPetya, wiped data from the computers of banks, energy firms, senior government officials and an airport.

The GRU military spy agency created NotPetya, the CIA concluded with "high confidence" in November, according to classified reports cited by U.S. intelligence officials.

--------

The attacks reflect Russia’s mounting aggression in cyberspace as part of a larger “hybrid warfare” doctrine that marries traditional military means with cyber-tools to achieve its goal of regional dominance. “It’s a pattern of more bold, aggressive action,” said Robert Hannigan, former head of Britain’s GCHQ intelligence agency.

Of course, anyone who was neither an imbecile nor a whore could see that this attribution was ridiculous, because one of the victims of this attack was Russia’s chief oil company Rosneft.

https://www.bloomberg.com/news/articles/2017-06-27/ukraine-russia-report...

Well, Ukraine has just convicted and sentenced (to one year’s probation!) the UKRAINIAN who was behind the PETYA/NOT PETYA attacks:

https://twitter.com/Deus_Abscondis/status/1037921869150576641

(Hat tip to “Deus Abscondis” for finding this.)

He plead guilty to both creating and spreading the virus.

Ukraine may wish to explain why a hacker who caused billions of dollars worth of damage was sentenced to one year probation. Chances are he knows some things they don’t want him to talk about.

I haven’t noticed that the Washington Post has retracted its story — have you?

Cyber researcher George Eliason maintains that the Fancy Bear (APT28) malware claimed to have been responsible for the May 2016 hack of the DNC, that our Deep State maintains is from the GRU (https://en.wikipedia.org/wiki/Fancy_Bear), is in fact possessed by Ukrainian intelligence, and they are using it to cast blame on Russia for its own hacking exploits.

https://washingtonsblog.com/2018/06/fancy-bear-exposed-the-people-behind...

By now, our Deep State knows that, on the flimsiest of grounds (or none at all), it can “assess” that Russian intelligence has been responsible for a cybercrime, and our dutiful MSM will immediately trumpet this assessment as fact.

“Evidence? Evidence? We don’t’ need no stinkin’ evidence!!”

At this point, I think it should be a crime punishable by imprisonment to take the “assessments” of our Deep State seriously without giving them extensive vetting first. As I have been stating interminably for over a year now, there is excellent reason to suspect that the entire “Russia interfered in our election” narrative is a hoax concocted by our Deep State in collaboration with Hillary’s DNC. This hoax accomplishes a numerous Deep State goals: exonerating Hillary for her ignominious loss (while distracting attention from the fact that the DNC cheated Bernie); demonizing the Deep State’s mortal enemy Julian Assange in the eyes of half the population; further demonizing Russia, so that Russia will be perceived as a major enemy that we’ll need to spend trillions of dollars confronting; and enabling the “Trump colluded with Russia” narrative that is crippling Trump’s presidency and forcing him to “be tough” with Russia.

Tags: 
Share
up
1 user has voted.