NATO & Ukraine Agree Deeper Cyber Co-operation

NATO has quickly signed a deal with Ukraine to strengthen its cyber support after a damaging attack against Kyiv, when more than 70 government websites were hacked. Ukrainian government computer systems were pentrated and covert 'wiper' malware installed

It appears that the malware lay dormant on some systems for months before dropping their malicious code onto the networks. 

These attacks have prompted fears that Russia could be plotting an invasion and according to the Ukrainian Digital Development Ministry “All evidence indicates that Russia is behind the cyber attack." The Kremlin has denied Russian involvement. 

The intrusions were only discovered when dozens of government agencies in Ukraine were suddenly targeted in a defacement campaign in which hackers replaced the main web page of about a dozen sites with a politically charged message and attempted to deface others. The same day the defacements occurred, Microsoft discovered the destructive wiper code on the systems of a handful of entities in Ukraine, this included government agencies and at least one IT company now believed to be the Ukrainian software and web site development firm called Kitsoft.

NATO Security General Jens Stoltenberg said experts were already working with Ukraine to tackle these most recent cyber attack. 

The new agreement with Ukraine will enhance cyber cooperation and allow Ukrainian access to NATO’s malware information sharing platform and identify where training may be needed for Ukrainian personnel. The recent cyber attacks on Ukraine came as tensions have soared between Moscow and the West over allegations the Kremlin could be plotting a fresh incursion into its neighbour after massing some 100,000 troops at the border. Western allies have warned that a land invasion of Ukraine could be preceded by a hacking attack to knock out key infrastructure in Ukraine. 

Microsoft has said that the recent cyber attacks could prove destructive and affect more organisations than initially feared, adding that it was continuing to analyse the malware and warned it could render government digital infrastructure inoperable. 

Described as a possible Master Boot Record (MBR) wiper, Microsoft says the malware is executed when an impacted device is powered down and disguises itself as ransomware, but lacks a ransom recovery mechanism and is intended to be destructive and permanently disable targeted devices.

Moscow and NATO allies failed to make a breakthrough to ease tensions over Ukraine at high-stakes talks last week. The Kremlin has laid down a series of demands to NATO and the United States, including ruling out granting Ukraine membership in the alliance.

NATO Secretary General Jens Stoltenberg said that experts from NATO and its members were already on the ground, working with Ukraine to tackle the latest cyber attack. Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

NATO:      Microsoft:    Zero Day:    Talos:     Oodaloop:     Security Week:    Times of Israel:     

Ecomonic Times:    AA / Anodolu 

You Might Also Read: 

Russian Turla Hackers Specialise In Attacking  Government Agencies:

 

 

« The Next 9/11 Will Be A Cyber Attack
Red Cross Hacked - Half A Million Victims At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

CENSUS

CENSUS

CENSUS is a Cybersecurity services provider offering services to multiple industries worldwide such as Security Testing, Code Auditing, Secure SDLC, Vulnerability Research and Consulting Services.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.