Russian Military Intelligence Unit Linked to Major Hacks: Paris
Paris has accused Russia’s Fancy Bear group of orchestrating cyberattacks against entities that are actively involved in French society.
French officials stated that a clandestine unit from Russia’s military intelligence, the GRU, is linked to multiple hacking incidents since 2021.
“In cyberspace, France monitors, obstructs, and combats its adversaries.”
Furthermore, France’s Ministry for Europe and Foreign Affairs disclosed the identity and location of a GRU unit contributing to APT28, referred to as Unit 20728.
In its statement, the ministry noted that since 2021, this attack methodology has been employed to compromise a dozen French institutions.
These institutions are significant players in French society, including public services, private enterprises, and a sports organization connected to the 2024 Olympic and Paralympic Games.
The ministry remarked that this same “modus operandi” was previously utilized by the GRU in the 2015 sabotage of the TV5 Monde television network.
The station’s Facebook page displayed a warning to French troops to avoid the “Islamic State.”
ID cards belonging to relatives of French soldiers involved in anti-IS operations were also published.
Authorities mentioned that the same unit attempted to undermine the French electoral process in 2017.
France is currently on its highest security alert for the Olympics.
In preparation for the games, French Interior Minister Gerald Darmanin warned about the potential for terrorist attacks from Islamic extremists and Iranian-backed pro-Hamas factions.
“Many European partners have also been victims of APT28 in recent years,” the ministry added.
“These destabilizing activities are unacceptable and unworthy of a permanent member of the UN Security Council.
“They contradict the United Nations standards on responsible state behavior in cyberspace, which Russia has formally accepted.”
France’s National Information Systems Security Agency released a report on Wednesday addressing the threat posed by APT28 to thwart potential future attacks.
The report highlighted that APT28 operators execute “phishing campaigns” designed to deceive individuals into divulging sensitive information like passwords, credit card numbers, or personal details.
Additionally, it noted that the operators utilize “brute-force attacks,” especially against webmail platforms, while taking advantage of vulnerabilities.
The hacking group’s tactics, active since at least 2004, are frequently employed against government and military organizations, as well as the defense, energy, and media sectors, particularly across Europe and North America.
According to a report from France’s National Cybersecurity Agency (ANSSI), released in March, there were 4,386 security issues recorded in 2024, marking a 15 percent increase from the previous year.
This surge was mainly linked to entities identified as having ties to Russia and China, with the report stating, “2024 experienced a rise in attacks aimed solely at destabilization, primarily conducted by hacktivist groups.”
The Epoch Times reached out to Russia’s embassy in Paris for commentary but did not receive a response by the time of publication.
Chris Summers contributed to this report.