Russia cyber attacks: Who are the Fancy Bear and Sandworm hackers?
Sky News breaks down the most important revelations as Vladimir Putin's spies are accused of targeting the British Foreign Office.
Thursday 4 October 2018 15:31, UK
Russia's military intelligence service has been accused of carrying out "brazen close access cyber operations across the world".
Defence Secretary Gavin Williamson accused the country of carrying out the actions of a "pariah state".
Here, Sky News takes a look at the biggest revelations to emerge.
What we know so far
:: Russia's GRU intelligence service has been accused of targeting the UK Foreign Office and Porton Down laboratories in failed "spearfishing" attacks
:: The spies carried out the attack on Porton Down while the laboratory was investigating the Salisbury poisonings of the Skripals
:: The US Justice Department has charged seven Russian military intelligence officers with hacking anti-doping agencies and other organisations
:: Dutch authorities say they disrupted a Russian cyber operation targeting the Organisation for the Prohibition of Chemical Weapons (OPCW)
:: Three cyber officers and a case officer have been pictured arriving at Schipol airport from Moscow on 10 April
:: They went on a reconnaissance mission to the OPCW headquarters
:: The OPCW was working to verify the UK's analysis of the chemical weapons used against the Skripals in Salisbury
:: The GRU is said to have carried out the mission after its unsuccessful attacks on the British Foreign Office and Porton Down
:: The organisation was also due to conduct analysis of the chemical weapons attack in Douma, Syria, in April
:: Britain's ambassador to the Netherlands Peter Wilson has said the Russian operation was "not an isolated attack"
:: Mr Wilson said the unit involved is known in the Russian military as unit 26165
:: The ambassador said the unit has sent officers around the world to conduct "brazen close access cyber operations"
:: One of the officers also conducted "malign activity" in Malaysia to collect information about the MH17 investigation
:: Mr Wilson said the mission targeted Malaysian government institutions including the attorney general's office
:: GRU officers stopped in The Hague planned to travel to the OPCW laboratory in Switzerland
:: One of the officers' laptops showed it had connected to wifi at a hotel in Lausanne, Switzerland, in September 2016
:: Officials from the International Olympic Committee and the Canadian Centre for Ethics in Sport were attending a World Anti-Doping Agency conference in Lausanne, and found themselves victims of a cyber attack
:: APT28, also known as Fancy Bear, is a cyber espionage group
:: One Canadian Centre official from the conference had their laptop compromised by APT28 malware
:: The Canadian Centre's computer systems were then infected more broadly by APT28 malware
:: APT28 action also compromise the IP addresses of the International Olympic Committee
:: The UK National Cyber Security Centre has also identified the GRU as being behind the hacking group "Sandworm", which was active in the wake of the Salisbury poisonings
:: The British government has publicly revealed that the GRU is behind APT28 and a number of other cyber actions
:: Peter Wilson says the GRU has interfered in elections and carried out a "hostile campaign of cyber attacks"
:: Mr Wilson said the GRU is a "well-funded body of the Russian state"
:: The National Cyber Security Centre said it was "almost certainly" the GRU was behind a "BadRabbit" attack in October 2017 that caused disruption to the Kiev metro, Odessa airport and Russia's central bank
:: Australia has joined Britain in blaming the GRU for major hacking plots, including the US Democratic party
:: NATO chief Jens Stoltenberg has warned Russia to halt its "reckless" behaviour
:: Russia has rejected the cyber attack allegations and said they are part of a disinformation campaign