“07/11/23 Expect us,” the CyberTriad hacking group with ties to Russia and China wrote on Platform X. It was the announcement of a series of attacks on Poland and Lithuania in connection with the Vilnius summit. And they actually attacked, a the worst effect was the attack on the IT systems of the Academy of War Studies (ASzWoj). In social media, hackers shared documents found on the computers of this university. He took a closer look at this attack.
Hackers attacked the largest Polish military university
According to the journalists of this portal, they managed to obtain “a drawn structure of the armored brigade and a diagram of its exercises using the command support system code-named ‘Jaśmin'”. It was made public in a file called “Layout of workstations for exercise BM-22”. In addition, the hackers posted a detailed description of the exercises with the specific tasks they were performing on Telegram. It contains 26 names of Polish officers ranging from lieutenant to major. In this way, it was suggested that data belonging to the university had been stolen.
Other files have also been published “As-built documentation. Delivery, assembly and commissioning of active devices of the WiFi wireless network in building no. 46” and “Instructions for services – March 2022”, which describes, among others, affiliation of keys that can open specially protected rooms. In this way, the hackers wanted to signal to Poland that even .
The Academy of Martial Arts is still paralyzed
Onet found out at the university that the effects of the July attack are still being felt today. Anonymously, one of the employees says that apart from the website and the administration office, everything does not work. Office computers were also to be shut down. This has been confirmed by several sources. The university itself also confirmed that there was indeed an attack. Immediately after the attack, the relevant institutions dealing with cybernetics were informed about it.
What’s more, according to what Onet has learned, the consequences of the attack may be even more far-reaching. Probably wiper software was used. According to the Check Point network security group, “The purpose of a wiper attack is to make the attacked entity lose access to dataIn addition, “the wiper destroys infected data forever by encrypting or overwriting their content, hackers can also attack the operating system, thus preventing them from getting to the data on ” – This means that some of the data may have been lost irretrievably.
Source: Gazeta

Mabel is a talented author and journalist with a passion for all things technology. As an experienced writer for the 247 News Agency, she has established a reputation for her in-depth reporting and expert analysis on the latest developments in the tech industry.