NATO & Ukraine Agree Deeper Cyber Co-operation

NATO has quickly signed a deal with Ukraine to strengthen its cyber support after a damaging attack against Kyiv, when more than 70 government websites were hacked. Ukrainian government computer systems were pentrated and covert 'wiper' malware installed

It appears that the malware lay dormant on some systems for months before dropping their malicious code onto the networks. 

These attacks have prompted fears that Russia could be plotting an invasion and according to the Ukrainian Digital Development Ministry “All evidence indicates that Russia is behind the cyber attack." The Kremlin has denied Russian involvement. 

The intrusions were only discovered when dozens of government agencies in Ukraine were suddenly targeted in a defacement campaign in which hackers replaced the main web page of about a dozen sites with a politically charged message and attempted to deface others. The same day the defacements occurred, Microsoft discovered the destructive wiper code on the systems of a handful of entities in Ukraine, this included government agencies and at least one IT company now believed to be the Ukrainian software and web site development firm called Kitsoft.

NATO Security General Jens Stoltenberg said experts were already working with Ukraine to tackle these most recent cyber attack. 

The new agreement with Ukraine will enhance cyber cooperation and allow Ukrainian access to NATO’s malware information sharing platform and identify where training may be needed for Ukrainian personnel. The recent cyber attacks on Ukraine came as tensions have soared between Moscow and the West over allegations the Kremlin could be plotting a fresh incursion into its neighbour after massing some 100,000 troops at the border. Western allies have warned that a land invasion of Ukraine could be preceded by a hacking attack to knock out key infrastructure in Ukraine. 

Microsoft has said that the recent cyber attacks could prove destructive and affect more organisations than initially feared, adding that it was continuing to analyse the malware and warned it could render government digital infrastructure inoperable. 

Described as a possible Master Boot Record (MBR) wiper, Microsoft says the malware is executed when an impacted device is powered down and disguises itself as ransomware, but lacks a ransom recovery mechanism and is intended to be destructive and permanently disable targeted devices.

Moscow and NATO allies failed to make a breakthrough to ease tensions over Ukraine at high-stakes talks last week. The Kremlin has laid down a series of demands to NATO and the United States, including ruling out granting Ukraine membership in the alliance.

NATO Secretary General Jens Stoltenberg said that experts from NATO and its members were already on the ground, working with Ukraine to tackle the latest cyber attack. Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

NATO:      Microsoft:    Zero Day:    Talos:     Oodaloop:     Security Week:    Times of Israel:     

Ecomonic Times:    AA / Anodolu 

You Might Also Read: 

Russian Turla Hackers Specialise In Attacking  Government Agencies:

 

 

« The Next 9/11 Will Be A Cyber Attack
Red Cross Hacked - Half A Million Victims At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Cyber-Physical Systems Security Institute (CPSSI)

Cyber-Physical Systems Security Institute (CPSSI)

CPSSI is a non-profit, by-invitation-only research and educational organization focused on practical and theoretical solutions to the cybersecurity challenges facing Cyber-Physical Systems.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.