Russia Will Keep Up Cyber Attacks For Geo-Political Influence

The Russian Federation is sure to use cyber attacks as one of the tools of the geopolitical impact. Oleg Frolov, the deputy head of the SBU, Ukraine's security service said this during the first conference of leaders of counter-terrorism agencies of UN member states in New York.

'A number of powerful and complicated attacks, cynical by design and catastrophic by potential consequences, on the networks of energy, banking and transport sectors of Ukraine's economy and the communication networks, have once again shown the intentions of the aggressor to use cyber-attacks as one of the tools of geopolitical influence', he said.

Over the past several months, Russian hackers have been trying to infect the computers and networks of Ukrainian companies with malware, so as to create the backdoors for a large-scale attack. Serhiy Demedyuk, the head of the Cyber Police of Ukraine said this as quoted by Reuters. 

 According to him, the malefactors attack companies in various sectors of the economy, but most often, their targets would be banks and energy sector enterprises.  

Demedyuk added that judging by the structure of the malware, the hackers plan to conduct the major attack on a particular day. 'According to our research, the hackers spread the malware, which is divided into various components, sent from different sources, to avoid being detected by the anti-virus software. When assembled on one device, these components combine into the malware, which deals the actual damage.

According to Frolov, propaganda became one of the key components of the hybrid aggression against Ukraine; it created the playground for unfurling an entire arsenal of other conventional and non-conventional methods of waging war, such as using illegal armed units, initialing internal disorders, resorting to cyber-attacks and economic pressure. 

Besides, the Internet is used to spread radical ideas, recruiting supporters and funding the illegal activity, related to terrorism.
The Ukrainian side also mentioned the necessity to join efforts in the struggle against terrorism and extremism. 

Currently, the Ukrainian police cooperate with the foreign agencies in order to find these hackers. Demedyuk assured that the Ukrainian side is now much better prepared to deter potential attacks, like the one that happened exactly one year ago, on June 27, 2017, when ransomware called Petya when hit thousands of computers in Ukraine and abroad, encrypting the data stored on these devices and demanding money in exchange for the 'decryption'.

112.UA:           112:UA

You Might Also Read:

Ukraine Says Russian Hackers Are Preparing A Massive Strike:

America Can Learn About Russian Disinformation From Europe:

 

 

« Coast Guard Academy Creates New Cybersystems Program
Is Cyber The Perfect Weapon? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.