At Esrange in Kiruna, there is one of the world's largest ground stations that receives and stores data from satellites in space.

According to the Swedish Defense Research Agency, FOI, the satellite images can be used to observe nuclear missiles or naval bases.

Esrange is owned by Svenska Rymdaktiebolaget SSC and when the news of the major hacker attack came, the security organization was forced to start on all cylinders.

"Very advanced attack"

So far, it has not been possible to see that any data has been stolen according to Stefan Gustafsson, head of strategic security at Rymbolaget.

- This is a very advanced attack.

It is unlike anything we have seen before and we hope that our measures and the strong cooperation that exists between our expert authorities and other actors around the world will give a sufficient result, so that this does not have to have a negative impact.

Rymdaktiebolaget is just one of at least a dozen companies in Sweden where hackers as early as this spring built back doors into the IT environments.

SVT Nyheter's tour of some of the largest Swedish companies shows that, for example, Skanska and Volvo AB have investigated how they were affected by the hacker attack.

Both tell SVT Nyheter that they could not see that the hackers were inside and stole information.

Volvo Cars writes in an email to SVT that they also used the software, Solarwind Orion, which the hacker attack was carried out with there are no indications that the company was affected.

The telecom giant Ericsson, which also uses Solarwind Orion, does not want to comment on anything that has to do with the hacker attack.

Russian hackers or imitations

The accusations are currently being leveled at a Russian hacker group APT29, but some cyber security experts warn that these may also be deliberate imitations.

- There are certain things that have similarities with them.

But what has happened recently in the area of ​​cyber security is what is usually called false flagging, that these groups use each other's methods and each other's products and systems, says Jonas Lejon, cyber security expert.