Russia Will Keep Up Cyber Attacks For Geo-Political Influence

The Russian Federation is sure to use cyber attacks as one of the tools of the geopolitical impact. Oleg Frolov, the deputy head of the SBU, Ukraine's security service said this during the first conference of leaders of counter-terrorism agencies of UN member states in New York.

'A number of powerful and complicated attacks, cynical by design and catastrophic by potential consequences, on the networks of energy, banking and transport sectors of Ukraine's economy and the communication networks, have once again shown the intentions of the aggressor to use cyber-attacks as one of the tools of geopolitical influence', he said.

Over the past several months, Russian hackers have been trying to infect the computers and networks of Ukrainian companies with malware, so as to create the backdoors for a large-scale attack. Serhiy Demedyuk, the head of the Cyber Police of Ukraine said this as quoted by Reuters. 

 According to him, the malefactors attack companies in various sectors of the economy, but most often, their targets would be banks and energy sector enterprises.  

Demedyuk added that judging by the structure of the malware, the hackers plan to conduct the major attack on a particular day. 'According to our research, the hackers spread the malware, which is divided into various components, sent from different sources, to avoid being detected by the anti-virus software. When assembled on one device, these components combine into the malware, which deals the actual damage.

According to Frolov, propaganda became one of the key components of the hybrid aggression against Ukraine; it created the playground for unfurling an entire arsenal of other conventional and non-conventional methods of waging war, such as using illegal armed units, initialing internal disorders, resorting to cyber-attacks and economic pressure. 

Besides, the Internet is used to spread radical ideas, recruiting supporters and funding the illegal activity, related to terrorism.
The Ukrainian side also mentioned the necessity to join efforts in the struggle against terrorism and extremism. 

Currently, the Ukrainian police cooperate with the foreign agencies in order to find these hackers. Demedyuk assured that the Ukrainian side is now much better prepared to deter potential attacks, like the one that happened exactly one year ago, on June 27, 2017, when ransomware called Petya when hit thousands of computers in Ukraine and abroad, encrypting the data stored on these devices and demanding money in exchange for the 'decryption'.

112.UA:           112:UA

You Might Also Read:

Ukraine Says Russian Hackers Are Preparing A Massive Strike:

America Can Learn About Russian Disinformation From Europe:

 

 

« Coast Guard Academy Creates New Cybersystems Program
Is Cyber The Perfect Weapon? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.

Bastion Security Group

Bastion Security Group

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini.