Russia Will Keep Up Cyber Attacks For Geo-Political Influence

The Russian Federation is sure to use cyber attacks as one of the tools of the geopolitical impact. Oleg Frolov, the deputy head of the SBU, Ukraine's security service said this during the first conference of leaders of counter-terrorism agencies of UN member states in New York.

'A number of powerful and complicated attacks, cynical by design and catastrophic by potential consequences, on the networks of energy, banking and transport sectors of Ukraine's economy and the communication networks, have once again shown the intentions of the aggressor to use cyber-attacks as one of the tools of geopolitical influence', he said.

Over the past several months, Russian hackers have been trying to infect the computers and networks of Ukrainian companies with malware, so as to create the backdoors for a large-scale attack. Serhiy Demedyuk, the head of the Cyber Police of Ukraine said this as quoted by Reuters. 

 According to him, the malefactors attack companies in various sectors of the economy, but most often, their targets would be banks and energy sector enterprises.  

Demedyuk added that judging by the structure of the malware, the hackers plan to conduct the major attack on a particular day. 'According to our research, the hackers spread the malware, which is divided into various components, sent from different sources, to avoid being detected by the anti-virus software. When assembled on one device, these components combine into the malware, which deals the actual damage.

According to Frolov, propaganda became one of the key components of the hybrid aggression against Ukraine; it created the playground for unfurling an entire arsenal of other conventional and non-conventional methods of waging war, such as using illegal armed units, initialing internal disorders, resorting to cyber-attacks and economic pressure. 

Besides, the Internet is used to spread radical ideas, recruiting supporters and funding the illegal activity, related to terrorism.
The Ukrainian side also mentioned the necessity to join efforts in the struggle against terrorism and extremism. 

Currently, the Ukrainian police cooperate with the foreign agencies in order to find these hackers. Demedyuk assured that the Ukrainian side is now much better prepared to deter potential attacks, like the one that happened exactly one year ago, on June 27, 2017, when ransomware called Petya when hit thousands of computers in Ukraine and abroad, encrypting the data stored on these devices and demanding money in exchange for the 'decryption'.

112.UA:           112:UA

You Might Also Read:

Ukraine Says Russian Hackers Are Preparing A Massive Strike:

America Can Learn About Russian Disinformation From Europe:

 

 

« Coast Guard Academy Creates New Cybersystems Program
Is Cyber The Perfect Weapon? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

HardSecure

HardSecure

Hardsecure supports organizations to face security threats through the adoption of cybersecurity capabilities that guarantee 360º monitoring, visibility, mitigation, and blocking.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Quatrro Business Support Services (QBSS)

Quatrro Business Support Services (QBSS)

QBSS is a tech-enabled outsourcing firm that’s changing the way companies think about finance, accounting, human resources and technology services.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.