NATO & Ukraine Agree Deeper Cyber Co-operation

NATO has quickly signed a deal with Ukraine to strengthen its cyber support after a damaging attack against Kyiv, when more than 70 government websites were hacked. Ukrainian government computer systems were pentrated and covert 'wiper' malware installed

It appears that the malware lay dormant on some systems for months before dropping their malicious code onto the networks. 

These attacks have prompted fears that Russia could be plotting an invasion and according to the Ukrainian Digital Development Ministry “All evidence indicates that Russia is behind the cyber attack." The Kremlin has denied Russian involvement. 

The intrusions were only discovered when dozens of government agencies in Ukraine were suddenly targeted in a defacement campaign in which hackers replaced the main web page of about a dozen sites with a politically charged message and attempted to deface others. The same day the defacements occurred, Microsoft discovered the destructive wiper code on the systems of a handful of entities in Ukraine, this included government agencies and at least one IT company now believed to be the Ukrainian software and web site development firm called Kitsoft.

NATO Security General Jens Stoltenberg said experts were already working with Ukraine to tackle these most recent cyber attack. 

The new agreement with Ukraine will enhance cyber cooperation and allow Ukrainian access to NATO’s malware information sharing platform and identify where training may be needed for Ukrainian personnel. The recent cyber attacks on Ukraine came as tensions have soared between Moscow and the West over allegations the Kremlin could be plotting a fresh incursion into its neighbour after massing some 100,000 troops at the border. Western allies have warned that a land invasion of Ukraine could be preceded by a hacking attack to knock out key infrastructure in Ukraine. 

Microsoft has said that the recent cyber attacks could prove destructive and affect more organisations than initially feared, adding that it was continuing to analyse the malware and warned it could render government digital infrastructure inoperable. 

Described as a possible Master Boot Record (MBR) wiper, Microsoft says the malware is executed when an impacted device is powered down and disguises itself as ransomware, but lacks a ransom recovery mechanism and is intended to be destructive and permanently disable targeted devices.

Moscow and NATO allies failed to make a breakthrough to ease tensions over Ukraine at high-stakes talks last week. The Kremlin has laid down a series of demands to NATO and the United States, including ruling out granting Ukraine membership in the alliance.

NATO Secretary General Jens Stoltenberg said that experts from NATO and its members were already on the ground, working with Ukraine to tackle the latest cyber attack. Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

NATO:      Microsoft:    Zero Day:    Talos:     Oodaloop:     Security Week:    Times of Israel:     

Ecomonic Times:    AA / Anodolu 

You Might Also Read: 

Russian Turla Hackers Specialise In Attacking  Government Agencies:

 

 

« The Next 9/11 Will Be A Cyber Attack
Red Cross Hacked - Half A Million Victims At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.