Roshka georgy petrovich parallel computing technologies. Has Russia Hacked Macron? The evidence is far from certain. Russian hacker attacks - Trump's problem

In the published on May 5, the array of hacked correspondence between Emmanuel Macron and his headquarters, a number of letters were discovered that were modified by a user named Georgy Petrovich Roshka - this is evidenced by the metadata of the letters.

The documents where The Insider found traces of Georgy Roshka (and there are at least 6 of them) are financial documents of Macron's headquarters, here is one of them:

The real author of the document, judging by the same metadata, was the treasurer of Macron's headquarters - Cedric O (this is not an abbreviation, but the full name). But then the document was changed by a certain Georgy Roshka. A man named Georgy Petrovich Roshka works at Evrika CJSC, which produces computers and software, the main clients of which are Russian government agencies, including the Ministry of Defense and special services.

Georgy Roshka is a programmer who participated in specialized conferences, for example, "Parallel Computing Technologies", which took place in 2014 in Rostov-on-Don. At the time of publication, Rosca did not respond to The Insider's request.

We will remind, yesterday, May 5, the Internet portal WikiLeaks published a link to the hacked correspondence of French presidential candidate Emmanuel Macron and his entourage, consisting of several hundred thousand emails, photos and attachments, dated until April 24, 2017. The array is about 9 GB in size.

Macron's team reported that the documents were obtained a few weeks ago as a result of hacking the personal and work mailboxes of some representatives of the "Forward!" and noted that in addition to real letters and documents, there are also fakes in the array.

Earlier, the Japanese company Trend Micro confirmed that the Russian hacker group Pawn Storm, also known as Fancy Bear and APT28, is behind the cyber attack on Macron's resources (which the headquarters recorded back in February). The same group has previously carried out numerous cyber attacks in other Western countries, including the United States, where, on the eve of the presidential elections, the hacked Democratic Party mail was also handed over to WikiLeaks for distribution.

Recall that the founder of WikiLeaks is Julian Assange, who is also known for his show on the Russia Today TV channel.

Note that earlier, a number of independent companies in the field of information security independently confirmed the connection of Fancy Bear / APT28 with the Russian authorities (among them, including Google experts). One of the first was Trend Micro, which discovered a powerful hacker group with a special attack style called the Pawn Storm company. The company was able to establish that the same group was used both in the attack on the Russian opposition, and in the attack on American servers (later this was confirmed by a number of other companies). A Trend Micro expert spoke in more detail about these attacks in an interview with The Insider.

Earlier, Russian hackers have already been noticed in the fact that in the laid out arrays, real documents are interspersed with fakes. This was the case, for example, when laying out the massifs of the Open Society Foundation by George Soros, where, together with real files, crudely forged documents were posted, designed to create the impression that Alexei Navalny was receiving money from the foundation.

What is common between the leader of the Malyshevskaya organized criminal group Gennady Petrov, Vladimir Putin, members of the Ozero cooperative, the former presidential envoy Ilya Klebanov, the Almaz-Antey Concern, the 16th Center for Electronic Intelligence of the FSB and the Center for Special Developments of the Ministry of Defense of the Russian Federation?

Hacking, editing and publishing Emmanuel Macron's mail 2 days before the election. "Municipal Scanner" is trying to understand in detail the attempt to influence the outcome of the French elections.

After two days before the presidential elections in France, “the correspondence between Emmanuel Macron and his staff” was published on the Wikileaks website, the Bulgarian project “Bivol” discovered that a number of letters were edited. The Insider reported:

The real author of the document, judging by the metadata, was the treasurer of Macron's headquarters - Cedric O (this is not an abbreviation, but the full name). But then the document was changed by a certain Georgy Roshka. A man named Georgy Petrovich Roshka works at Evrika CJSC, which produces computers and software, the main clients of which are Russian government agencies, including the Ministry of Defense and special services.

It is known that JSC "Evrika" received from the FSB licenses to carry out activities to protect state secrets.

According to the sites http://www.eureca.org/ and http://www.eureca.ru/ , "Eureka" is exclusively engaged in the supply of printers, computer hardware, software and courses for advanced training of IT specialists. Since February 2011, Evrika CJSC has received government contracts for 1 billion rubles. The main customers are the Ministry of Defense and enterprises of the military-industrial complex. Omsk Irtysh PA and "Research Institute of Instrument Engineering" who are developing communications systems for the navy.

Georgy Roshka himself (presumably born in 1985)lit up only once - took part in the annual conference "Parallel computing technologies", which was held in Rostov-on-Don in April 2014, indicating "Eureka" as his place of work."Parallel computing technologies ”(PAVT-2014) is an international scientific conference dedicated to the development and application of parallel computing technologies in various fields of science and technology. The conference is organized by the Federal Agency for Scientific Organizations of Russia and the Supercomputer Consortium of Russian Universities.

Photos of the participants of the PAVT-2014 conference

The same conference was attended by servicemen of units 51952 and 71330. Both military units are part of the 16th Center for electronic intelligence on communications and are subordinate to the FSB of Russia. The Center is the main structure for Internet operations outside of Russia and is responsible for intercepting, decrypting and processing electronic messages.

PAVT-2014 was also visited by 3 employees from FSUE Research Institute “Kvant”. "Kvant", the founder of which is the FSB, purchased Software from the Italian company Hacking Team, which develops spyware and hacker software. At the same time, 2 employees of FSUE NII "Kvant" Sergey Soshnikov and Alexey Faustov, who visited PAVT-2014, pointed out his place of work military unit 71330 in 2006 at the SoRuCom conference.

Sergey Soshnikov

From “Eureka”, besides G. Roshka, two more employees arrived at PAVT-2014 - Pogosyan Alexander Vladimirovich and Zaitsev Sergey Nikolaevich. In 2015 in the magazine "Radiotekhnika" Sergei Zaitsev, who is presented as an employee of the Center for Special Development of the Ministry of Defense of the Russian Federation.

Center for special developments of the Ministry of Defense of the Russian Federation in 2013-2014 is active looking for for hiring mathematicians with knowledge of cryptoalgorithms and programmers.

Job offer at the Center for Special Development under the Ministry of Defense

The Center also holds competitions for schoolchildren, identifying talented future specialists. In 2016, such competitions were attended by "Young programmers of the FSB of Russia", aboutwhom she told Meduza.

A hacker and a regular CTF participant told Meduza that such events are the main place where information security specialists are offered work in the special services: they approach hackers during breaks, hand out brochures, and invite them to come and talk.

ZAO Evrika itself denies any involvement in Roshka. As Deputy Director Irina Vladimirskaya commented to journalist Anastasia Kirilenko,

“Roshka Georgy Petrovich in the period from 01.01.2003 to 10.05.2016 in CJSC“ EUREKA ”did not work on a permanent basis and no civil law contracts were concluded with him. Also, Georgy Petrovich Roshka was not found in the lists of students of the training center, as well as in the eureca.ru domain e-mail address database. CJSC EUREKA did not participate in the conference Parallel computing technologies in 2014 in Rostov-on-Don. "

It is not known whether ZAO Evrika participated in PAVT conferences in other years and whether Georgy Roshka worked for the company since 10.05.2016.

At the same time, Irina Vladimirskaya reported that Georgy Roshka

"According to the information available in open sources, I participated in similar conferences in 2016 in Arkhangelsk and 2017 in Kazan, indicating other organizations as employers."

We could not find a list of participants for these conferences. However, the list of PAVT-2014 was promptly removed from the organizers' website after G. Rosca was found in it.

And one of the organizers of PAVT Leonid Sokolinsky, Vice-Rector for Informatization of SUSU, said A. Kirilenko:

"As a result of a technical failure on May 11, there is currently no information about the conference participants for the period specified in the request."

As The Insider found out, at the PAVT-2016 conference Georgy Roshka indicated his place of work as “military unit No. 26165” (the 85th main center of the GRU special service, specializing in cryptography).

Operating company CJSC "EUREKA" was established in 2004 by three citizens:

  • Nikolaev Alexey Yurievich (70.9%, General Director);
  • Kinal Alexander Viktorovich (20.9%);
  • Erik Kotelkov (8.2%)

Until 2011, there was another CJSC "EUREKA" , which was established in 2000 by the same composition, plus Evgeny Vladimirovich Penkovsky (Chairman of the Board of Directors of LLC "Holding Company" Evrika Group ",Member of the Council of the St. Petersburg Chamber of Commerce and Industry ) and Ilyichev Yuri Valentinovich, who was the deputy general director of Evrika.

In 2000, Evgeny Penkovsky worked as the Director of Power Sales of JSC Lenenergo andlit up in the media when he was threatened with trial for wanting to cut off the power to the navy's grid.

The main owner of the operating "Evrika" Alexey Nikolaev from 2011 to May 2017 conducted a joint business with people from the environment Dmitry Pankin, who was the head of the Federal Service for Financial Markets, and since February 2015 has been appointed Chairman of the Board of the Eurasian Development Bank.

Alexey Nikolaev

CJSC "Evrika" (20%) together with the daughter of Alexey Nikolaev - Ekaterina (80%) are the foundersLLC "EUREKA-PROM" , which also has government contracts with enterprises of the military-industrial complex, for example withAlmaz-Antey Air Defense Concern producing air defense systems for ground (BUK-M1) and sea-based (Klinok, Rif-M). Specialization of government contracts - laser systems.

Ekaterina Nikolaeva

In September 2015 the company "Evrika-Prom"received license No. 0067908 from the Federal Security Service to carry out work using information constituting a state secret. The condition for the performance of work with the use of state secrets for "Erica-Prom" is the receipt of services for their protection from CJSC "Evrika".

FSB license

In addition, Ekaterina Nikolaeva is the owner of 30% of the company YugInterProgress LLC (Taganrog, Rostov region), which owns the hotel and sportscomplex "Admiral" ... Partner E. Nikolaeva -Levin Ilya Izrailevich(30%), director Scientific Research Center of Supercomputers and Neurocomputers LLC ... 18.2% YugInterProgress is owned by a specialist in the field of multiprocessor computing and control systemsKalyaev Igor Anatolievich , Head of the Department of the Southern Scientific Center of the Russian Academy of Sciences "Intelligent and multiprocessor systems" at the SFedU. I. Levin and I. Kalyaev are regular participants in the PAVT conferences.

The second daughter of Alexei Nikolaev, Maria, with Alexander Kinal is the owner of Evrika + LLC, which supplies office equipment and printing equipment under government contracts. Since 2005, Alexander Kinal with Maria Nikolaeva is the foundertraining center "Eureka" , which trains IT specialists and certifies them.

Maria Nikolaeva

The third daughter is Tatiana Nikolaeva, according to herpages on the social network Vkontakte, lives in Los Angeles.

Olga Andronova, wife of Alexei Nikolaev, died in 2016. In 2009-2011 Olga Andronova,Deputy General Director of "Evrika" , actively fighting against the construction of the Okhta Center, promoted by the governor Valentina Matvienko,complained about election irregularities and openly criticized Governor Matvienko.

Zaks.ru : Then Olga Andronova took the floor. She criticized all the activities of Valentina Matvienko as governor, and said that this style of campaigning is the apotheosis of the work of the former governor in St. Petersburg.

Olga Andronova

A group of lawyers, hired by Andronov, filed fifty complaints in courts, including the ECHR, having achieved a ban on the construction of the Okhta Center in the Krasnogvardeisky district of St. Petersburg.

Petersburg journalist Alexandra Garmazhapova told us about her visit to the “Eureka Training Center”, which is located at 118 Moskovsky Prospekt:

I visited the Eureka office in August 2014. Olga Andronova wanted to download from my dictaphone "Olympus" a recording from a closed meeting on the municipal elections of the governor Valentina Matvienko. At it, officials discussed how to make Valentina Ivanovna the desired result in order to push her to the Federation Council. The recording was of poor quality and its specialists had to “draw out” the main sound. The room, stuffed with wires, was rather stuffy, the curtains were down, computers were everywhere and “young talents” [talking about the workers of “Eureka”], as Andronova called them, were hanging around. It was impossible to move around the office unaccompanied, security guards at the entrance, in the premises of the surveillance camera, the entrance to the premises by access keys.

Training center "Eureka"

The Eureka training center is officially located at St. Petersburg, Moskovsky Prospekt 118. This building also has a second address according to Rosreestr - St. Petersburg st. Kolya Tomchak, 9 letter B. It is this address that is indicated in the FSB license as the place where Eureka-Prom LLC operates using information classified as “secret”. The building is located on the back side of the quarter, on the territory of which there isScientific and technical center "Zaslon" (the company is under controlAnatoly Turchak ), developing military aviation systems and electronic systems for the Navy.

Six months before the resignation of Valentina Matvienko, political scientist Stanislav Belkovsky spoke :

The clouds are really gathering around the governor of St. Petersburg. But, as far as I know, the decision on her resignation has not yet been made ... In my opinion, the presidential envoy Ilya Klebanov, the Kovalchuk brothers-businessmen, close to Putin, are cool towards Matvienko ... It is already clear that Matvienko is making concessions to the president. For example, she refused to build a skyscraper on Okhta.

The second current owner of Eureka is Alexander Kinal, born in 1966. In 1998 he graduated from two universities at once: St. Petersburg University of Economics and Finance andBaltic State Technical University "VOENMEKH" D.F. Ustinova ... In 2000, he owned 16.36% of the shares of CJSC "Evrika" and held the postcompany accountant .

In St. Petersburg, Alexander Kinal has been the owner of a three-star hotel since 2005"Ladoga".

In June 2009 the Federal Agency for State Property Managementby its order appointed to the board of directors of OJSC “Navigator Plant” by Alexander Kinal, who at that time was the assistant to the general directorJSC "Concern PVO" Almaz-Antey " . Factory "Navigator" in St. Petersburg - the leading Russian plant for the production of navigation equipment and time-based systems. In 2007 he became a participant in the GLONASS / GPS satellite navigation equipment program.

Also in June 2009 Alexander Kinalbecomes a member of the Board of Directors of JSC VNIIRA.Research Institute "Radio Equipment" is engaged in the development and production of navigation systems, location, flight control systems and is 100% owned by the Air Defense Concern "Almaz-Antey".

Aleksandr Kinal remained the assistant to the general director of the Almaz-Antey Air Defense Concern until 2011.

From 2008 to 2013 Alexander Kinal was a member board of directors JSC "Lomo". "Lomo" - is engaged in the development and production of optical devices. From military developments - fire control systems, including for ballistic missiles, range finders, optical sights, telescopes.

Alexander Kinal was appointed to the board of directors of Lomo as a shareholder of Sputnik LLC, which is owned by Aleksey Vladimirovich Korolev. Place of work of Alexander Kinal -Chief Financial Officer of CJSC Evrika .

Together with Alexander Kinal, the Lomo council includes Yuri Ilyichev as a director of Evrika CJSC (currently the general director of Evrika MNPO CJSC), his brother Vasily Ilyichev, who is a shareholder (in 2016 increased his share of up to 25% of shares) and the general director of Lomo, later - advisor to the general director, from 1991 to 1999 was General Director of ZAO Evrika. Also on the board of directors was Dmitry Kozharsky, asset manager of FOR Group, a large fishing company owned by the Ilya Klebanov family.

So "Lomo" is controlled by a brother, wife and daughter Ilya Klebanov ... In 2003-2011, Ilya Klebanov served as Plenipotentiary Representative of the President of the Russian Federation in the North-West Federal District, after 2011 - Chairman of the Board of Directors of the company OJSC Sovcomflot ". From 1992 to 1997, Ilya Klebanov headed Lomo, and in 1993 he successfully privatized a defense plant, which came under the control of his family.

Ilya Klebanov

In December 2016, Alexander Kinal at bidding acquired a land plot from the settlement of Murino in the Leningrad Region for 47.8 million rubles. Building plotwith an area of ​​39 hectares is located in a forest on the territory of the former military unit 71403 not far from the residential complex “Novaya Okhta” under construction. On the river ”(developer“ LSR Group ”Andrey Molchanov, whopreviously carried out construction in conjunction with the Federal Security Service ).

On February 9, 2017, Alexander Kinal purchased an apartment in an elite building on Kamenny Island in St. Petersburg at 19, 2nd Berezovaya Alley.

The house was built in 2007 by the Baltic Construction Company, which controls Anton Gennadievich Petrov. The house is adjacent to the state residences K-3 and K-4 and is guarded.

Gennady Petrov, 2008, Spain

Gennady Petrov - leaderMalyshevskaya organized criminal group ... In 2008, 20 Russian citizens were detained in Spain, including Gennady Petrov. All of them were accused of money laundering, arms trafficking, contract killings, extortion, drug supply, document forgery, cobalt and tobacco smuggling. Spanish investigators managed to find out the role of Petrov in Russian politics. So, from the wiretapped conversations, the Spanish investigators managed to learn that the head of the Investigative Committee, Alexander Bastrykinfor his appointment is obliged Gennady Petrov. In 2012, Gennady Petrovmanaged to escape from Spain, he and his wife Elena were declared by Spain wanted.

The legality of the source of funds for the purchase of a land plot and an elite apartment by Alexander Kinal raises questions. Out of a dozen companies, of which he is the owner and co-owner, only one in the last 10 years has brought in profits of more than 1 million rubles a year. The rest worked “at zero” and at a loss in profit.

Conclusions from all of the above

  1. The Eureka company is directly related to joint work with the FSB and the Ministry of Defense. Most likely, cyber intelligence uses Eureka CJSC to cover up its work.
  2. Cyber ​​intelligence of Russia took part in editing the mail of “Macron’s headquarters”. What exactly was the role of each (Ministry of Defense, FSB and “Eureka”) - this question remains open, but it is clear that they have a great merger among themselves.
  3. Versions that “someone used the data of G. Rosca in order to discredit Russia” are not consistent. “Eureka” does not completely deny that she knows Georgy Roshka. If someone wanted to do such a discrediting of "honest intelligence officers" who, according to Putin, do not intelligence anything, they would use the name of a person who has a public relation to Russian cyber intelligence, and not a person without a biography.

05/30/2017. Interview Vladimir Putin to the newspaper Le Figaro:

I have already spoken on this score many times. Today one of your colleagues also posed a question on this topic. He did it very carefully at a press conference, saying that "they say they are supposedly Russian hackers." “They say” - who says, on what basis? "Allegedly Russian hackers", and maybe not Russian. Mr. Trump himself once said, and spoke absolutely, in my opinion, correctly: “Or maybe this is from another country: maybe someone, lying on the bed, came up with something, or maybe someone- then specially inserted some kind of flash drive somewhere with the name of some Russian citizen ", - or something else like that. After all, anything in this virtual world can be heaped up. Russia never does this, we don't need it ... It makes no sense for us to do this. What's the point?

Original taken from avmalgin to Georgy Petrovich, your mustache is unstuck

In the published on May 5, the array of hacked correspondence between Emmanuel Macron and his headquarters, a number of letters were discovered that were modified by a user named Georgy Petrovich Roshka - this is evidenced by the metadata of the letters.

The documents where The Insider found traces of Georgy Roshka (and there are at least 6 of them) are financial documents of Macron's headquarters, here is one of them:

The real author of the document, judging by the same metadata, was the treasurer of Macron's headquarters - Cedric O (this is not an abbreviation, but the full name). But then the document was changed by a certain Georgy Roshka. A man named Georgy Petrovich Roshka works at Evrika CJSC, which produces computers and software, the main clients of which are Russian government agencies, including the Ministry of Defense and special services.

Georgy Roshka is a programmer who participated in specialized conferences, for example, "Parallel Computing Technologies", which took place in 2014 in Rostov-on-Don. At the time of publication, Rosca did not respond to The Insider's request.

We will remind, yesterday, May 5, the Internet portal WikiLeaks published a link to the hacked correspondence of French presidential candidate Emmanuel Macron and his entourage, consisting of several hundred thousand emails, photos and attachments, dated until April 24, 2017. The array is about 9 GB in size.

Macron's team reported that the documents were obtained a few weeks ago as a result of hacking the personal and work mailboxes of some representatives of the "Forward!" and noted that in addition to real letters and documents, there are also fakes in the array.

Earlier, the Japanese company Trend Micro confirmed that the Russian hacker group Pawn Storm, also known as Fancy Bear and APT28, is behind the cyber attack on Macron's resources (which the headquarters recorded back in February). The same group has previously carried out numerous cyber attacks in other Western countries, including the United States, where, on the eve of the presidential elections, the hacked Democratic Party mail was also handed over to WikiLeaks for distribution.

Recall that the founder of WikiLeaks is Julian Assange, who is also known for his show on the Russia Today TV channel.

Note that earlier, a number of independent companies in the field of information security independently confirmed the connection of Fancy Bear / APT28 with the Russian authorities (among them, including Google experts). One of the first was Trend Micro, which discovered a powerful hacker group with a special attack style called the Pawn Storm company. The company was able to establish that the same group was used both in the attack on the Russian opposition, and in the attack on American servers (later this was confirmed by a number of other companies). A Trend Micro expert spoke in more detail about these attacks in an interview with The Insider.

Earlier, Russian hackers have already been noticed in the fact that in the laid out arrays, real documents are interspersed with fakes. This was the case, for example, when laying out the massifs of the Open Society Foundation by George Soros, where, together with real files, crudely forged documents were posted, designed to create the impression that Alexei Navalny was receiving money from the foundation.

In the published on May 5, the array of hacked correspondence between Emmanuel Macron and his headquarters, a number of letters were discovered that were modified by a user named Georgy Petrovich Roshka - this is evidenced by the metadata of the letters.

The documents where The Insider found traces of Georgy Roshka (and there are at least 9 of them) are financial documents of Macron's headquarters, here is one of them:

The real author of the document, judging by the same metadata, was the treasurer of Macron's headquarters - Cedric O (this is not an abbreviation, but the full name). But then the document was changed by a certain Georgy Roshka. A man named Georgy Petrovich Roshka works at Evrika CJSC, which produces computers and software, the main clients of which are Russian government agencies, including the Ministry of Defense and special services.

For example, it is known that Evrika CJSC received licenses from the FSB to carry out activities to protect state secrets, and also fulfilled contracts for NPO Kvant JSC, which works for the Ministry of Defense.

Georgy Roshka is a programmer who participated in specialized conferences, for example, "Parallel Computing Technologies", which took place in 2014 in Rostov-on-Don. At the time of publication, Rosca did not respond to The Insider's request.

We will remind, yesterday, May 5, the Internet portal WikiLeaks link to the hacked correspondence of French presidential candidate Emmanuel Macron and his entourage, consisting of several hundred thousand emails, photos and attachments, dated until April 24, 2017. The array is about 9 GB in size.

Macron's team reported that the documents were obtained a few weeks ago as a result of hacking the personal and work mailboxes of some representatives of the "Forward!" and noted that in addition to real letters and documents, there are also fakes in the array.

Earlier, the Japanese company Trend Micro, that the Russian hacker group Pawn Storm, also known as Fancy Bear and APT28, is behind the cyber attack on Macron's resources (which the headquarters recorded back in February). The same group has previously carried out numerous cyber attacks in other Western countries, including the United States, where, on the eve of the presidential elections, the hacked Democratic Party mail was also handed over to WikiLeaks for distribution.

Recall that the founder of WikiLeaks is Julian Assange, who is also known for his own on the Russia Today TV channel.

Note that earlier, a number of independent companies in the field of information security independently confirmed Fancy Bear / APT28 with the Russian authorities (including Google experts). One of the first was Trend Micro, which discovered a powerful hacker group with a special attack style called the Pawn Storm company. The company was able to establish that the same group was used both in the attack on the Russian opposition and in the attack on the American servers (this was later confirmed by other companies). A Trend Micro expert spoke in more detail about these attacks in The Insider.

Earlier, Russian hackers have already been noticed in the fact that in the laid out arrays, real documents are interspersed with fakes. This was the case, for example, when laying out the massifs of the Open Society Foundation by George Soros, where, together with real files, crudely forged documents were posted, designed to create the impression that Alexei Navalny was receiving money from the foundation.