CyberWatchers Profile picture
Sep 12, 2023 10 tweets 3 min read Read on X
Here is an updated chart following further research into the attempts by Ilya Medvedovsky to obscure his attempts to avoid sanctions imposed by the US DOT on his companies Digital Security (DSEC), ERPScan and Embedi that we first highlighted in
🧵1/9
Image
As you can see, we have a new individual that has links to the subject companies. Dmitriy Chastuhin is a security analyst specializing in SAP, who has appeared as a speaker at multiple conferences when Director of Business Application Pen testing at ERPScan. 2/9 Image
In 2011 he also attended the Zero Nights hacker conference as a security researcher from DSEC and in 2014 spoke at CONFIDENCE 2014 representing DSEC. In 2019 Chastuhin founded Hexway and is the self proclaimed CEO. 3/9
Hexway advertises products such as their Pentest as a Service (PTaas) platform, referred to as "Hive" and "Apiary" by the company, and ASOC solution, "Vampy", which is a "universal DevSecOps platform to simplify vulnerability management". 4/9
Previously on , Hexway was provided by Kreado Software Limited, a business entity registered in Cyprus. 5/9Hexway.io
This connection was very recently removed from the website following our last post. It appears that DSEC is further trying to obfuscate their reach by removing names from their products. 6/9
Image
Image
We have also discovered that the contact email address for Digital Compliance, Digital Security Services and DSEC is the same, ddoc@dsec.ru. Company records show that Digital Compliance and Cyber Service are "Related/Connected Persons". 7/9
Evgeny Budin is listed as the Head of both DSEC and Digital Security Services. DSEC and Digital Security Services are listed as "Related/Connected Persons". 8/9
Digital Compliance and Digital Security Services have room numbers located at the same postal address, suggesting a strong connection between the two companies. 9/9
@threadreaderapp unroll

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with CyberWatchers

CyberWatchers Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @cyber_watchers

Feb 25
A hacker appears to have acquired a large amount of unsecured data which they claim to be from the threat
actor CADET BLIZZARD (a group associated with Russian GRU unit 29155) and their enabler, Russian tech company IMPULS.
medium.com/@ma1ev01ence/2…
According to the Medium article shared on BlueSky, the Hacker acquired the data in November 24 and has published some of the search results on the platform. #GRU #Hack
bsky.app/profile/mal-ev…
The hack included information relating to a targeting system named EGEON which comprised of hacked and leaked data and contained the personal information of millions of people, enabling persona research by the group.
Read 32 tweets
Jun 18, 2024
Russian Federal State Unitary Enterprise Scientific Research Institute Kvant had sanctions imposed on it by the US Department of Treasury as part of EO13694 on 11 June 2018 (Blocking the property of certain persons engaging in significant malicious cyber enabled activities). Image
According to Treasury press release sm0401 at the time this was in response to Russian state sponsored cyber-attacks alleged to have been targeting critical infrastructure.
in particular for contributing to the improvement of Russia's cyber capabilities through their "material and technological support" to the FSB.
Read 15 tweets
May 31, 2024
According to the Center for European Policy Analysis (CEPA), SyTech is a small company that has workded on contracts for the FSB 16th Center (Signals Intelligence unit 71330) since 2009. SyTech appears to be a private company but shares personnel and contracts with KVANT. Image
The Kvant Scientific Research Institute was founded in 1978 and though officially civilian was under
the control of the KGB. In the 2000's Kvant came under the control of the FSB, essentially the KGB by
another name. Kvant was sanctioned by the US in 2018. Image
In July 2019 7.5 TB of documents were stolen from SyTech and published on the Darknet by the hacker group 0v1ru$. The data included 20 non-public IT projects ordered by Russian special services and departments.
Read 13 tweets
Apr 11, 2024
Zeroday Technologies LLC, 0Дт, OOO ЗИРОУДЭЙ ТЕХНОЛОДЖИС, is a technology company that "specializes in the development of automation
and information protection tools." A hack of the company in 2019 revealed contracts with FSB Center 12 and 18. Details in .n0debreak.com/2023/04/01/mee…
The company was founded in December 2011 by CEO Ruslan Radzhabovich Gilyazov, a member of the Informaiton Security Faculty at Moscow
State University, and is located in the Yasenevo Municipal District of Moscow.
0DT was added to the sanctions list of the US Treasury Department on the anniversary of the invasion of Ukraine for cybersecurity and disinformation ops linked to the Russian Intelligence Services.
Read 14 tweets
Mar 22, 2024
JSC InfoTeks is a leader in the Russian information security market. The company was formed in 1991, its founder and General Director, Andrey Anatolievich Chapchaev, attended the Higher School of the KGB and worked in the research division of the KGB between 1982-1991. Image
InfoTeks has been sanctioned by the Council of the European Union for its work in creating systems and tools for Russian Security Services. In addition, the company has also been indicted by the US for enabling the malicious activity of Russian Cyber actors.
According to its website () the company is a manufacturer of high-tech software and hardware and software for information security. The company head office is in Moscow with branches located across the breadth of Russia, from St Petersburg to Vladivostok.infotecs.ru
Read 7 tweets
Feb 13, 2024
According to a CISA advisory, actors associated with FSUE TsNIIKhM are responsible for developing
destructive ICS malware. TsNIIKhM has also been sanctioned by the US Department of Treasury for
connections to the Triton Malware. Image
In 2021 the US indicted an employee of the institute, Evgeny Gladkikh, for installing TRITON malware on a safety system of global energy facilities and using techniques designed to enable future damage with potentially catastrophic effects on a Shneider Electric safety system.
However, when the TRITON malware was deployed, it caused a fault that led the refinery's safety systems to initiate two automatic emergency shutdowns of the refinerys operations.
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(