On New Year's Eve, the Poles put some cranberry infosec under the Christmas tree.
So, on December 30, gov.pl published news about Russian cyberattacks on Polish information resources.
First, they told about the attack on the Polish Sejm and phishing from the positions of a fake website in order to extort money. We would have thought - usually fraud. An no - "an operation aimed at spreading chaos (sic!), undermining the Polish state, as well as collecting personal data and extorting money." Who can do such terrible things is absolutely clear right away. Russian hackers.
No unnecessary things like TTP's are required. And we, by a sinful deed, can't even remember anyone from the infosec of Polish specialists, except Rutkovskaya (not Yana Rudkovskaya, they saw, but Joanna Rutkovskaya). Although maybe we have a leaky memory.
(We have recently had someone put paper out of the office toilet. Definitely an operation aimed at spreading chaos, undermining the state, as well as extorting toilet paper!)
Well, they wrote and wrote, it would seem - "fuck him, with Semenych" (with). But then the Poles remembered about GhostWriter. And this is the scariest cling, about which we have written repeatedly, the last time here.
In a nutshell: At first, Mandiant was told that GhostWriter is an influence operation, whose - they did not say. Then the Germans said that it was the Russian APT that attacked the Bundestag. Then again, Mandiant was told that yes, Russia is behind GhostWriter (but this is still an influence campaign, not APT). Then the EU was told that it was still the Russian APT, which had shamed all the state bodies of the EU and its members. And then Mandiant came out again and said that GhostWriter is Belarusians after all (but not APT, but an influence campaign).
And each time, the conscious Western information society hesitated along with the party line.
Now the Poles are talking about GhostWriter.
To quote ourselves, the media component of the modern infosec differs from the fucking circus only in the absence of a tent.