უნგრეთი: ოპოზიციამ ისტორიული გამარჯვება მოიპოვა, ორბანმა მარცხი აღიარა
Partisans sabotage key transit hub for Russian military cargo to Zaporizhzhia front
Eastern-rite Christians celebrate Easter
Russia’s war casualty toll in Ukraine up by 1,070 over past day
US and Iran fail to reach agreement to end war – JD Vance
Ukrainian air defense downs rare Russian drones Knyaz Veshchiy Oleg and Izdeliye-54
Ukraine’s USFs eliminate over 82,000 Russian troops in 10 months
Electricity imports: PM Svyrydenko holds meeting with Ukrenergo leadership

DeepFake technology dupes Berlin, Madrid mayors into thinking they speak with Klitschko

25.06.2022 ნახვები: 423

The perpetrator, posing as Kyiv Mayor Vitaliy Klitschko, held talks via ZOOM with the mayors of Berlin and Madrid.

That’s according to Vitaliy Klitschko’s statement issued on Telegram, Ukrinform reports.

According to the Kyiv mayor of Kyiv, "the enemy just can’t stop and keeps waging war on all fronts – including to spread disinformation and compromise Ukrainian politicians, in order to pit them with European partners so that they stop helping Ukraine."

As Klitschko noted, yesterday, on his behalf, the mayors of several European capitals were allegedly sent requests for a video conference via ZOOM, from a fake email address. "As our friends react quickly and support us, the mayors of Berlin and Madrid agreed to talk. So with the help of DeepFake technology, the culprit spoke to them, posing as Klitschko," the Kyiv mayor said.

Read also: U.S. intelligence warns private companies of potential Russian cyberattacks

According to Klitschko, law enforcement must investigate such actions and, If necessary, engage foreign experts.

"By the way," the mayor of Kyiv stressed, "hybrid war, Russian disinformation is one of the topics of the panel discussion in which my brother and I are to participate within the NATO summit in Madrid next week."

As Ukrinform reported earlier, the State Service for Special Communications and Information Protection warns of a possible cyberattack aimed at Ukrainian telecom operators and providers. The phishing letters come from an email address in the gov.ua domain (possibly compromised) and hold password-protected attachments, entitled "Protocol for family members of missing serviceman LegalAid.rar." The RAR-archive contains the document entitled "Algorithm_LegalAid.xlsm," the opening of which will lead to the download and launch of the DarkCrystal RAT malware.

ყველას ნახვა
ყველას ნახვა
ყველას ნახვა
ყველას ნახვა