Russia Escalates Spying On Ukraine’s Allies

Russian state-backed hackers have conducted network spying and espionage activities against 128 organisations in 42 countries allied to Ukraine since the start of the war, according to Microsoft in it’s new findings published Wednesday 22nd of June.

Defending Ukraine: Early Lessons from the Cyber War is the report conducted by Microsoft’s threat intelligence and data science teams with the goal of sharpening our understanding of the threat landscape in the ongoing war in Ukraine.

“Microsoft has seen the Russian military launch multiple waves of destructive cyber-attacks against 48 distinct Ukrainian agencies and enterprises,” Brad Smith, the President and Vice Chair of Microsoft, said. “These have sought to penetrate network domains by initially comprising hundreds of computers and then spreading malware designed to destroy the software and data on thousands of others... Since the start of the war, the Russian targeting (of Ukraine’s allies) has been successful 29 percent of the time.”  

NATO is currently a focused target for Russia' computer operatives, according to the Microsoft report. 

American organisations are high on the list for the Russian hacking attacksoutside of Ukraine, according to Microsoft, but these Russian hacks include 42 countries which might have potential war information such as governments, firms, think tanks and humanitarian organisations. 

Those hacking attempts have successfully penetrated defenses 29% of the time, according to Microsoft. Of those successful breaches, a quarter resulted in data stolen from networks.  But Microsoft said it didn't have a full view of the hacking because some customers stored data on their own systems rather than in Microsoft's cloud computing infrastructure.

US Cyber Command, the military's hacking unit, has conducted a "full spectrum" of offensive, defensive and information operations in support of Ukraine and China has employed and trained some highly effective hackers on targets related to the Ukraine war, according to cyber security researchers. Furthermore, Suspected Chinese hackers appeared to try to break into computers linked to officials in the Russian city of Blagoveshchensk, near the Chinese border, according to Secureworks

Ukrainian officials have also accused the Russians of routing Internet traffic in parts of Ukraine through Russian Internet providers and subjecting those connections to censorship. 

Background 

The recorded history of every war typically includes an account of the first shots fired and who witnessed them. Each account provides a glimpse not just into the start of a war, but the nature of the era in which people lived. Historians who discuss the first shots in America’s Civil War in 1861 typically describe guns, cannons, and sailing ships around a fort near Charleston, South Carolina.

Events spiraled toward the launch of World War I in 1914 when terrorists in plain view on a city street in Sarajevo used grenades and a pistol to assassinate the archduke of the Austrian-Hungarian Empire. It would take until the Nuremberg war trials to fully understand what happened near the Polish border 25 years later. In 1939, Nazi SS troops dressed in Polish uniforms and staged an attack against a German radio station. Adolf Hitler cited such attacks to justify a blitzkrieg invasion that combined tanks, planes, and troops to overrun Polish cities and civilians.  Each of these incidents also provides an account of the technology of the time, technology that would play a role in the war that ensued and the lives of the people who lived through it. 

The war in Ukraine has a pattern and as the Russian army crossed the Ukrainian border on February 24th. However, the first shots were in fact fired a day earlier. They involved a cyber weapon called “Foxblade” that was launched against critical computer networks in Ukraine.

Reflecting the technology of our time, those among the first to observe the attack were half a world away, working in the United States.  This captures the importance of stepping back and taking stock of the first several months of the war in Ukraine, which has been devastating for the country in terms of destruction and loss of life, including innocent civilians.

Microsoft:       Secure Works:        Infosecurity Magazine:     CNN:      Reuters:     US News:     NBC

You Might Also Read: 

Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine:

« US Bank Loses Critical Data Of Over A Million Customers - Again
Cyber Security Tools For Your Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.