Syrian army says senior Islamic State militant killed

BEIRUT (Reuters) – The Syrian army said on Wednesday it had killed Islamic State’s military commander in Syria during operations in the north of the country, where the Russian-backed government forces are seizing more territory back from the jihadist group.

If confirmed, this would represent a major blow against Islamic State (IS) ahead of an attack which the U.S.-backed Syrian Democratic Forces (SDF) – an alliance of Kurdish and Arab fighters – are expected to launch against the jihadists in their stronghold of Raqqa city.

A Syrian military source told Reuters the IS commander, Abu Musab al-Masri, had been the group’s “minister of war” for Syria. Syrian state media had earlier cited a military source as saying he was the organization’s “minister of war”, suggesting he was the overall IS military commander.

He was named among 13 senior Islamic State figures killed in Syrian army operations east of Aleppo, including men identified as Saudi and Iraqi nationals, according to the military source cited by state media.

Al-Masri was killed in the operations that got underway on May 10. The military source did not say where he was killed.

Baghdad-based IS expert Hisham al-Hashimi said the death of Masri, if confirmed, would be a “significant blow to the group ahead of the battle of Raqqa”. He said al-Masri was the fourth most senior figure in the organization.

A previous IS minister of war, Abu Omar al-Shishani, was killed last year. The Pentagon said Shishani was likely to have been killed in a U.S. air strike in Syria. The militant group confirmed his death in July but said he had died fighting in the Iraqi city of Shirqat south of Mosul.

Islamic State faces separate campaigns in northern Syria by the Russian-backed Syrian army, the U.S.-backed SDF, and Turkey-backed rebels fighting under the Free Syrian Army banner.

The six-year-long Syrian war has allowed IS to seize swathes of Syria and to carve out a cross-border “caliphate” in both Syria and neighboring Iraq.

The SDF, which includes the Kurdish YPG militia, has been waging a multi-phased operation to encircle Raqqa with the aim of capturing it from Islamic State.

(Additional reporting by Maher Chmaytelli in Baghdad; Writing by Tom Perry; Editing by Gareth Jones)

Hackers hit Russian bank customers, planned international cyber raids

FILE PHOTO: The logo of Sberbank is seen on top of a building in central Moscow, Russia April 22, 2016. REUTERS/Maxim Zmeyev/File Photo

By Jack Stubbs

MOSCOW (Reuters) – Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.

Their campaign raised a relatively small sum by cyber-crime standards – more than 50 million roubles ($892,000) – but they had also obtained more sophisticated malicious software for a modest monthly fee to go after the clients of banks in France and possibly a range of other western nations.

Russia’s relationship to cyber crime is under intense scrutiny after U.S. intelligence officials alleged that Russian hackers had tried to help Republican Donald Trump win the U.S. presidency by hacking Democratic Party servers.

The Kremlin has repeatedly denied the allegation.

The gang members tricked the Russian banks’ customers into downloading malware via fake mobile banking applications, as well as via pornography and e-commerce programs, according to a report compiled by cyber security firm Group-IB which investigated the attack with the Russian Interior Ministry.

The criminals – 16 suspects were arrested by Russian law enforcement authorities in November last year – infected more than a million smartphones in Russia, on average compromising 3,500 devices a day, Group-IB said.

The hackers targeted customers of state lender Sberbank <SBER.MM>, and also stole money from accounts at Alfa Bank and online payments company Qiwi <QIWI.O>, exploiting weaknesses in the companies’ SMS text message transfer services, said two people with direct knowledge of the case.

Although operating only in Russia before their arrest, they had developed plans to target large European banks including French lenders Credit Agricole <CAGR.PA>, BNP Paribas <BNPP.PA> and Societe Generale <SOGN.PA>, Group-IB said.

A BNP Paribas spokeswoman said the bank could not confirm this information, but added that it “has a significant set of measures in place aimed at fighting cyber attacks on a daily basis”. Societe Generale and Credit Agricole declined comment.

The gang, which was called “Cron” after the malware it used, did not steal any funds from customers of the three French banks. However, it exploited the bank service in Russia that allows users to transfer small sums to other accounts by sending an SMS message.

Having infected the users’ phones, the gang sent SMS messages from those devices instructing the banks to transfer money to the hackers’ own accounts.

The findings illustrate the dangers of using SMS messages for mobile banking, a method favored in emerging countries with less advanced internet infrastructure, said Lukas Stefanko, a malware researcher at cyber security firm ESET in Slovakia.

“It’s becoming popular among developing nations or in the countryside where access to conventional banking is difficult for people,” he said. “For them it is quick, easy and they don’t need to visit a bank… But security always has to outweigh consumer convenience.”

CYBER CRIMINALS

The Russian Interior Ministry said a number of people had been arrested, including what it described as the gang leader. This was a 30-year-old man living in Ivanovo, an industrial city 300 km (185 miles) northeast of Moscow, from where he had commanded a team of 20 people across six different regions.

Four people remain in detention while the others are under house arrest, the ministry said in a statement.

“In the course of 20 searches across six regions, police seized computers, hundreds of bank cards and SIM cards registered under fake names,” it said.

Group-IB said the existence of the Cron malware was first detected in mid-2015, and by the time of the arrests the hackers had been using it for under a year.

The core members of the group were detained on Nov. 22 last year in Ivanovo. Photographs of the operation released by Group-IB showed one suspect face down in the snow as police in ski masks handcuffed him.

The “Cron” hackers were arrested before they could mount attacks outside Russia, but plans to do that were at an advanced stage, said the investigators.

Group-IB said that in June 2016 they had rented a piece of malware designed to attack mobile banking systems, called “Tiny.z” for $2,000 a month. The creators of the “Tiny.z” malware had adapted it to attack banks in Britain, Germany, France, the United States and Turkey, among other countries.

The “Cron” gang developed software designed to attack lenders including the three French groups, it said, adding it had notified these and other European banks at risk.

A spokeswoman for Sberbank said she had no information about the group involved. However, she said: “Several groups of cyber criminals are working against Sberbank. The number of groups and the methods they use to attack us change constantly.”

“It isn’t clear which specific group is being referred to here because the fraudulent scheme involving Android OS (operating system) viruses is widespread in Russia and Sberbank has effectively combated it for an extensive period of time.”

Alfa Bank did not provide a comment. Qiwi did not respond to multiple requests for comment.

Google <GOOGL.O>, the maker of Android, has taken steps in recent years to protect users from downloading malicious code and by blocking apps which are insecure, impersonate legitimate companies or engage in deceptive behaviors.

A Google spokesman said: “We’ve tracked this malware family for several years and will continue to take action on its variants to protect our users.”

FAKE MOBILE APPS

The Russian authorities, bombarded with allegations of state-sponsored hacking, are keen to show Russia too is a frequent victim of cyber crime and that they are working hard to combat it. The interior and emergencies ministries, as well as Sberbank, said they were targeted in a global cyberattack earlier this month.

Since the allegations about the U.S. election hacking, further evidence has emerged of what some Western officials say is a symbiotic relationship between cyber criminals and Russian authorities, with hackers allowed to attack foreign targets with impunity in return for cooperating with the security services while Moscow clamps down on those operating at home.

The success of the Cron gang was facilitated by the popularity of SMS-banking services in Russia, said Dmitry Volkov, head of investigations at Group-IB.

The gang got their malware on to victims’ devices by setting up applications designed to mimic banks’ genuine apps. When users searched online, the results would suggest the fake app, which they would then download. The hackers also inserted malware into fake mobile apps for well-known pornography sites.

After infecting a customer’s phone, the hackers were able to send a text message to the bank initiating a transfer of up to $120 to one of 6,000 bank accounts set up to receive the fraudulent payments.

The malware would then intercept a confirmation code sent by the bank and block the victim from receiving a message notifying them about the transaction.

“Cron’s success was due to two main factors,” Volkov said. “First, the large-scale use of partner programs to distribute the malware in different ways. Second, the automation of many (mobile) functions which allowed them to carry out the thefts without direct involvement.”

($1 = 56.0418 roubles)

(The story is refiled to fix typo in spelling of Societe Generale)

(Additional reporting by Maya Nikolaeva in Paris and Eric Auchard in Frankfurt; Editing by Christian Lowe and David Stamp)

Russian economy seen growing from 2017 onwards: World Bank

A man walks in front of the Novokuibyshevsk refinery near the city of Samara, October 28, 2010. REUTERS/Nikolay Korchekov/File Photo

MOSCOW (Reuters) – Russia’s oil-dependent economy is expected to grow from 2017 onwards, supported by higher global crude prices and oil production rising to new post-Soviet highs, the World Bank said on Tuesday.

The international lender said it expected Russian gross domestic product to grow by 1.3 percent in 2017 and by 1.4 percent in 2018 and 2019, following two years of economic contraction.

Greater oil earnings would “positively influence consumer and investor sentiment, leading to a recovery of domestic demand and modest economic growth in 2017-19,” the World Bank said in a semi-annual report.

It said its latest growth forecasts were based on the assumption that crude prices would average $55 a barrel this year, $60 in 2018 and $61.5 in 2019, and that an OPEC/non-OPEC agreement to restrict output was extended.

It cited International Energy Agency data as forecasting that Russia’s oil output would rise to 11.38 million barrels per day (bpd) this year and 11.54 million bpd next year, due to rising production by small- and medium-size energy companies.

The World Bank said rising consumption and a recovery in investment activity would drive Russia’s economic growth, citing the 2018 soccer World Cup that Russia is set to host as giving a potential boost to public investment.

Inflation is forecast to stabilize near the central bank’s target of 4 percent, but Russia’s longer-term growth prospects are constrained by low productivity, it added.

In November the World Bank forecast the Russian economy would grow 1.5 percent this year.

(Reporting by Andrey Ostroukh; Editing by Alexander Winning)

Flynn to decline U.S. Senate subpoena in Russia probe

National security adviser General Michael Flynn arrives to deliver a statement during the daily briefing at the White House

WASHINGTON (Reuters) – Former White House National Security Adviser Michael Flynn will decline to comply with a subpoena from the Senate Intelligence Committee investigating possible Russian interference in the 2016 U.S. election, according to media reports on Monday.

Flynn will invoke his Fifth Amendment protection against self-incrimination, the Associated Press, Wall Street Journal and Fox News reported, citing sources close to Flynn.

The retired lieutenant general, a key witness in the Russia probe, planned to inform the panel of his decision later on Monday, the reports said.

The Senate Intelligence Committee is conducting one of the main congressional probes of alleged Russian meddling in the U.S. presidential election and whether there was any collusion between President Donald Trump’s campaign and Russia.

The committee first requested documents from Flynn in an April 28 letter, but he declined to cooperate with the request.

The U.S. intelligence community concluded in January that Moscow tried to sway the November vote in Trump’s favor. Russia has denied involvement and Trump insists he won fair and square.

Flynn was forced to resign in February, after less than a month on the job, for failing to disclose the content of his talks with Sergei Kislyak, Russia’s ambassador to the United States, and then misleading Vice President Mike Pence about the conversations.

Reuters reported on Thursday that Flynn and other advisers to Trump’s campaign were in contact with Russian officials and others with Kremlin ties in at least 18 calls and emails during the last seven months of the U.S. presidential race. Flynn has acknowledged being a paid consultant to the Turkish government during the campaign.

(Reporting by Doina Chiacu Editing by W Simon and Dan Grebler)

Exclusive: Hackers hit Russian bank customers, planned international cyber raids

FILE PHOTO: SIM cards are reflected on a monitor showing binary digits in this picture illustration taken

By Jack Stubbs

MOSCOW (Reuters) – Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.

Their campaign raised a relatively small sum by cyber-crime standards – more than 50 million roubles ($892,000) – but they had also obtained more sophisticated malicious software for a modest monthly fee to go after the clients of banks in France and possibly a range of other western nations.

Russia’s relationship to cyber crime is under intense scrutiny after U.S. intelligence officials alleged that Russian hackers had tried to help Republican Donald Trump win the U.S. presidency by hacking Democratic Party servers.

The Kremlin has repeatedly denied the allegation.

The gang members tricked the Russian banks’ customers into downloading malware via fake mobile banking applications, as well as via pornography and e-commerce programs, according to a report compiled by cyber security firm Group-IB which investigated the attack with the Russian Interior Ministry.

The criminals – 16 suspects were arrested by Russian law enforcement authorities in November last year – infected more than a million smartphones in Russia, on average compromising 3,500 devices a day, Group-IB said.

The hackers targeted customers of state lender Sberbank, and also stole money from accounts at Alfa Bank and online payments company Qiwi, exploiting weaknesses in the companies’ SMS text message transfer services, said two people with direct knowledge of the case.

Although operating only in Russia before their arrest, they had developed plans to target large European banks including French lenders Credit Agricole, BNP Paribas and Societe General, Group-IB said.

A BNP Paribas spokeswoman said the bank could not confirm this information, but added that it “has a significant set of measures in place aimed at fighting cyber attacks on a daily basis”. Societe General and Credit Agricole declined comment.

The gang, which was called “Cron” after the malware it used, did not steal any funds from customers of the three French banks. However, it exploited the bank service in Russia that allows users to transfer small sums to other accounts by sending an SMS message.

Having infected the users’ phones, the gang sent SMS messages from those devices instructing the banks to transfer money to the hackers’ own accounts.

The findings illustrate the dangers of using SMS messages for mobile banking, a method favored in emerging countries with less advanced internet infrastructure, said Lukas Stefanko, a malware researcher at cyber security firm ESET in Slovakia.

“It’s becoming popular among developing nations or in the countryside where access to conventional banking is difficult for people,” he said. “For them it is quick, easy and they don’t need to visit a bank… But security always has to outweigh consumer convenience.”

CYBER CRIMINALS

The Russian Interior Ministry said a number of people had been arrested, including what it described as the gang leader. This was a 30-year-old man living in Ivanovo, an industrial city 300 km (185 miles) northeast of Moscow, from where he had commanded a team of 20 people across six different regions.

Four people remain in detention while the others are under house arrest, the ministry said in a statement.

“In the course of 20 searches across six regions, police seized computers, hundreds of bank cards and SIM cards registered under fake names,” it said.

Group-IB said the existence of the Cron malware was first detected in mid-2015, and by the time of the arrests the hackers had been using it for under a year.

The core members of the group were detained on Nov. 22 last year in Ivanovo. Photographs of the operation released by Group-IB showed one suspect face down in the snow as police in ski masks handcuffed him.

The “Cron” hackers were arrested before they could mount attacks outside Russia, but plans to do that were at an advanced stage, said the investigators.

Group-IB said that in June 2016 they had rented a piece of malware designed to attack mobile banking systems, called “Tiny.z” for $2,000 a month. The creators of the “Tiny.z” malware had adapted it to attack banks in Britain, Germany, France, the United States and Turkey, among other countries.

The “Cron” gang developed software designed to attack lenders including the three French groups, it said, adding it had notified these and other European banks at risk.

A spokeswoman for Sberbank said she had no information about the group involved. However, she said: “Several groups of cyber criminals are working against Sberbank. The number of groups and the methods they use to attack us change constantly.”

“It isn’t clear which specific group is being referred to here because the fraudulent scheme involving Android OS (operating system) viruses is widespread in Russia and Sberbank has effectively combated it for an extensive period of time.”

Alfa Bank did not provide a comment. Qiwi did not respond to multiple requests for comment.

Google, the maker of Android, has taken steps in recent years to protect users from downloading malicious code and by blocking apps which are insecure, impersonate legitimate companies or engage in deceptive behaviors.

A Google spokesman said: “We’ve tracked this malware family for several years and will continue to take action on its variants to protect our users.”

FAKE MOBILE APPS

The Russian authorities, bombarded with allegations of state-sponsored hacking, are keen to show Russia too is a frequent victim of cyber crime and that they are working hard to combat it. The interior and emergencies ministries, as well as Sberbank, said they were targeted in a global cyberattack earlier this month.

Since the allegations about the U.S. election hacking, further evidence has emerged of what some Western officials say is a symbiotic relationship between cyber criminals and Russian authorities, with hackers allowed to attack foreign targets with impunity in return for cooperating with the security services while Moscow clamps down on those operating at home.

The success of the Cron gang was facilitated by the popularity of SMS-banking services in Russia, said Dmitry Volkov, head of investigations at Group-IB.

The gang got their malware on to victims’ devices by setting up applications designed to mimic banks’ genuine apps. When users searched online, the results would suggest the fake app, which they would then download. The hackers also inserted malware into fake mobile apps for well-known pornography sites.

After infecting a customer’s phone, the hackers were able to send a text message to the bank initiating a transfer of up to $120 to one of 6,000 bank accounts set up to receive the fraudulent payments.

The malware would then intercept a confirmation code sent by the bank and block the victim from receiving a message notifying them about the transaction.

“Cron’s success was due to two main factors,” Volkov said. “First, the large-scale use of partner programs to distribute the malware in different ways. Second, the automation of many (mobile) functions which allowed them to carry out the thefts without direct involvement.”

($1 = 56.0418 roubles)

(Additional reporting by Maya Nikolaeva in Paris and Eric Auchard in Frankfurt; Editing by Christian Lowe and David Stamp)

New ferry links North Korea and Russia despite U.S. calls for isolation

The North Korean ferry, the Mangyongbong, is docked in the port of the far eastern city of Vladivostok, Russia, May 18, 2017. REUTERS/Yuri Maltsev

By Valeria Fedorenko

VLADIVOSTOK, Russia (Reuters) – A new ferry between isolated North Korea and Russia docked for the first time at the Pacific port of Vladivostok on Thursday, in spite of U.S. calls for countries to curtail relations with Pyongyang over its nuclear and missile programs.

The launch of the weekly service linking Vladivostok and the North Korean port of Rajin also came despite North Korea’s test-firing of a new type of ballistic missile on Sunday that landed in the sea near Russia.

The ferry’s Russian operators say it is purely a commercial venture, but the service’s launch coincides with what some experts say is a drive by North Korea to build ties with Moscow in case its closest ally China turns its back.

The service is pitched at Chinese tourists wanting to travel by sea to the Pacific port of Vladivostok, according to the operators.

China has no ports on the Sea of Japan, so traveling to North Korea and on to Vladivostok is the quickest way of reaching Vladivostok by sea.

“It’s our business, of our company, without any state subsidies, involvement and help,” Mikhail Khmel, the deputy director of Investstroytrest, the Russia firm operating the ferry, told reporters.

The new ferry link comes in spite of recent calls by U.S. Secretary of State Rex Tillerson for countries to fully implement U.N. sanctions and review their ties with North Korea to pressure it to give up its weapons programs.

“We call on all nations to fully implement U.N. Security Council Resolutions, and sever or downgrade diplomatic and commercial relations with North Korea,” a spokeswoman for the U.S. State Department, Katina Adams, said when asked about the new ferry service.

Adams noted Russia’s “obligation” under U.N. Security Council resolutions, “to inspect all cargo, including personal luggage, of any individual traveling to or from” North Korea.

Journalists were unable to see passengers disembarking from the North Korean-flagged vessel Mangyongbong at Vladivostok because Russian officials kept them away from the quayside, citing unspecified security reasons.

But Reuters television was able to speak to three passengers, who said they were representatives of Chinese tourism agencies.

One of the passengers showed a photograph on her smartphone she said had been taken on board. It showed a plaque with an inscription in Korean which, she said, bore the name of North Korea’s long-dead founder Kim Il Sung.

The United States has been discussing possible new U.N. sanctions on North Korea with China, which disapproves of North Korea’s development of nuclear weapons and ballistic missiles to deliver them, but remains its main trading partner.

Washington is looking to toughen U.N. sanctions to cut off Pyongyang’s sources of funding and to block smuggling of materials needed for its weapons programs.

Russia, especially the port of Vladivostok, is home to one of the largest overseas communities of North Koreans, who send home much-needed hard currency.

To date, there are no signs of a sustainable increase in trade between Russia and North Korea, but Russia has taken a more benign stance toward Pyongyang that other major powers.

Speaking in Beijing this week, Russian President Vladimir Putin said Moscow was against North Korea’s nuclear program, but that the world should talk to Pyongyang instead of threatening it.

Asked about the ferry, Russian Foreign Ministry spokeswoman Maria Zakharova said on Thursday she “didn’t see a connection” between the new service and political issues.

(Reporting by Valeria Fedorenko; additional reporting by David Brunnstrom; Writing by Maria Tsvetkova; Editing by Phil Berlowitz)

Vladimir Putin says can prove Trump did not pass Russia secrets

FILE PHOTO: Russian President Vladimir Putin speaks during a news conference at the Kremlin in Moscow, Russia, January 17, 2017. REUTERS/Sergei Ilnitsky/Pool/File Photo

SOCHI, Russia (Reuters) – Russian President Vladimir Putin said on Wednesday that U.S. President Donald Trump had not passed on any secrets to Russian Foreign Minister Sergei Lavrov during a meeting in Washington last week and that he could prove it.

Speaking at a news conference alongside Italian Prime Minister Paolo Gentiloni in the Black Sea resort of Sochi, Putin quipped that Lavrov was remiss for not passing on what he made clear he believed were non-existent secrets.

“I spoke to him (Lavrov) today,” said Putin with a smile. “I’ll be forced to issue him with a reprimand because he did not share these secrets with us. Not with me, nor with representatives of Russia’s intelligence services. It was very bad of him.”

Putin, who said Moscow rated Lavrov’s meeting with Trump “highly,” said Russia was ready to hand a transcript of Trump’s meeting with Lavrov over to U.S. lawmakers if that would help reassure them.

A Kremlin aide, Yuri Ushakov, later told reporters that Moscow had in its possession a written record of the conversation, not an audio recording.

Complaining about what he said were signs of “political schizophrenia” in the United States, Putin said Trump was not being allowed to do his job properly.

“It’s hard to imagine what else can these people who generate such nonsense and rubbish can dream up next,” said Putin.

“What surprises me is that they are shaking up the domestic political situation using anti-Russian slogans. Either they don’t understand the damage they’re doing to their own country, in which case they are simply stupid, or they understand everything, in which case they are dangerous and corrupt.”

Two U.S. officials said on Monday that Trump had disclosed highly classified information to Lavrov about a planned Islamic State operation, plunging the White House into another controversy just months into Trump’s short tenure in office.

Russia has repeatedly said that anti-Russian politicians in the United States are using groundless fears of closer ties with Moscow to sabotage any rapprochement and damage Trump in the process.

(Reporting by Denis Pinchuk/Jack Stubbs/Maria Tsvetkova; Writing by Andrew Osborn; Editing by Christian Lowe)

Ukraine imposes sanctions on Russian web firms, citing cyber threat

A Yandex taxi is seen in central Kiev, Ukraine, May 16, 2017. REUTERS/Gleb Garanich

By Natalia Zinets

KIEV (Reuters) – Ukraine imposed sanctions on Russia’s largest internet group Yandex and other popular online firms on Tuesday, saying it wanted to guard against cyber attacks, and the Kremlin threatened retaliation.

The restrictions froze any assets held by the Russian businesses inside Ukraine and banned hosts there from linking to them, though the websites were all still accessible in Kiev on Tuesday afternoon.

The ban was imposed partly to protect against companies “whose activities threaten the information and cyber security of Ukraine”, the Kiev government’s Security and Defence Council said in a statement.

They added to a list of more than 400 Russian firms blacklisted by Kiev since Moscow’s annexation of Crimea in 2014 and the ensuing pro-Russian separatist uprising in eastern Ukraine.

Mail.ru Group, which owns the Odnoklassniki social network and Vkontakte, Russia’s version of Facebook, said that around 25 million Ukrainians could be affected by the “politically motivated” decision.

“We have never been involved in politics. We have not broken a single law of Ukraine,” it said in a statement. It said the Ukrainian market contributed an “immaterial” amount of revenue and so Mail.ru would not revise its financial plans.

Yandex declined comment and there was no immediate comment from other companies on the list.

Kremlin spokesman Dmitry Peskov told journalists that Moscow had not forgotten the principle of reciprocity when it came to such disputes, calling the move “short-sighted.”

Many of the affected sites are hugely popular in Ukraine.

Vkontakte was the second-most visited website in Ukraine as of March, according to data cited by the Ukrainian Internet Association. Yandex, Odnoklassniki and Mail.ru were also in the top five most popular sites that month.

In comments to Russian newspaper Kommersant, Russian Foreign Ministry spokesman Maria Zakharova called the sanctions a “manifestation of politically motivated censorship”.

Moscow has repeatedly denied accusations from Kiev that it has been waging a “cyber war” on Ukraine at the same time as it fuels Ukraine’s separatist conflict by supporting rebels with troops and weapons.

Ukraine has also accused Russian computer hackers of targeting its power grid, financial system and other infrastructure with viruses.

(Additional reporting by Maria Kiselyova and Anastasia Teterevleva in Moscow; writing by Alessandra Prentice; editing by Matthias Williams and Mark Heinrich)