Here is an updated chart following further research into the attempts by Ilya Medvedovsky to obscure his attempts to avoid sanctions imposed by the US DOT on his companies Digital Security (DSEC), ERPScan and Embedi that we first highlighted in
🧵1/9
As you can see, we have a new individual that has links to the subject companies. Dmitriy Chastuhin is a security analyst specializing in SAP, who has appeared as a speaker at multiple conferences when Director of Business Application Pen testing at ERPScan. 2/9
In 2011 he also attended the Zero Nights hacker conference as a security researcher from DSEC and in 2014 spoke at CONFIDENCE 2014 representing DSEC. In 2019 Chastuhin founded Hexway and is the self proclaimed CEO. 3/9
Hexway advertises products such as their Pentest as a Service (PTaas) platform, referred to as "Hive" and "Apiary" by the company, and ASOC solution, "Vampy", which is a "universal DevSecOps platform to simplify vulnerability management". 4/9
Previously on , Hexway was provided by Kreado Software Limited, a business entity registered in Cyprus. 5/9Hexway.io
This connection was very recently removed from the website following our last post. It appears that DSEC is further trying to obfuscate their reach by removing names from their products. 6/9
We have also discovered that the contact email address for Digital Compliance, Digital Security Services and DSEC is the same, ddoc@dsec.ru. Company records show that Digital Compliance and Cyber Service are "Related/Connected Persons". 7/9
Evgeny Budin is listed as the Head of both DSEC and Digital Security Services. DSEC and Digital Security Services are listed as "Related/Connected Persons". 8/9
Digital Compliance and Digital Security Services have room numbers located at the same postal address, suggesting a strong connection between the two companies. 9/9
@threadreaderapp unroll
• • •
Missing some Tweet in this thread? You can try to
force a refresh
A hacker appears to have acquired a large amount of unsecured data which they claim to be from the threat
actor CADET BLIZZARD (a group associated with Russian GRU unit 29155) and their enabler, Russian tech company IMPULS. medium.com/@ma1ev01ence/2…
According to the Medium article shared on BlueSky, the Hacker acquired the data in November 24 and has published some of the search results on the platform. #GRU #Hack bsky.app/profile/mal-ev…
The hack included information relating to a targeting system named EGEON which comprised of hacked and leaked data and contained the personal information of millions of people, enabling persona research by the group.
Russian Federal State Unitary Enterprise Scientific Research Institute Kvant had sanctions imposed on it by the US Department of Treasury as part of EO13694 on 11 June 2018 (Blocking the property of certain persons engaging in significant malicious cyber enabled activities).
According to Treasury press release sm0401 at the time this was in response to Russian state sponsored cyber-attacks alleged to have been targeting critical infrastructure.
in particular for contributing to the improvement of Russia's cyber capabilities through their "material and technological support" to the FSB.
According to the Center for European Policy Analysis (CEPA), SyTech is a small company that has workded on contracts for the FSB 16th Center (Signals Intelligence unit 71330) since 2009. SyTech appears to be a private company but shares personnel and contracts with KVANT.
The Kvant Scientific Research Institute was founded in 1978 and though officially civilian was under
the control of the KGB. In the 2000's Kvant came under the control of the FSB, essentially the KGB by
another name. Kvant was sanctioned by the US in 2018.
In July 2019 7.5 TB of documents were stolen from SyTech and published on the Darknet by the hacker group 0v1ru$. The data included 20 non-public IT projects ordered by Russian special services and departments.
Zeroday Technologies LLC, 0Дт, OOO ЗИРОУДЭЙ ТЕХНОЛОДЖИС, is a technology company that "specializes in the development of automation
and information protection tools." A hack of the company in 2019 revealed contracts with FSB Center 12 and 18. Details in .n0debreak.com/2023/04/01/mee…
The company was founded in December 2011 by CEO Ruslan Radzhabovich Gilyazov, a member of the Informaiton Security Faculty at Moscow
State University, and is located in the Yasenevo Municipal District of Moscow.
0DT was added to the sanctions list of the US Treasury Department on the anniversary of the invasion of Ukraine for cybersecurity and disinformation ops linked to the Russian Intelligence Services.
JSC InfoTeks is a leader in the Russian information security market. The company was formed in 1991, its founder and General Director, Andrey Anatolievich Chapchaev, attended the Higher School of the KGB and worked in the research division of the KGB between 1982-1991.
InfoTeks has been sanctioned by the Council of the European Union for its work in creating systems and tools for Russian Security Services. In addition, the company has also been indicted by the US for enabling the malicious activity of Russian Cyber actors.
According to its website () the company is a manufacturer of high-tech software and hardware and software for information security. The company head office is in Moscow with branches located across the breadth of Russia, from St Petersburg to Vladivostok.infotecs.ru
According to a CISA advisory, actors associated with FSUE TsNIIKhM are responsible for developing
destructive ICS malware. TsNIIKhM has also been sanctioned by the US Department of Treasury for
connections to the Triton Malware.
In 2021 the US indicted an employee of the institute, Evgeny Gladkikh, for installing TRITON malware on a safety system of global energy facilities and using techniques designed to enable future damage with potentially catastrophic effects on a Shneider Electric safety system.
However, when the TRITON malware was deployed, it caused a fault that led the refinery's safety systems to initiate two automatic emergency shutdowns of the refinerys operations.