Russia’s Digital Weapons Refined Against Ukraine

The Petya virus, targeting Microsoft Windows-based systems, spread like wildfire across Europe and, to a lesser extent, America, affecting hundreds of large and small firms in France, Germany, Italy, Poland and Britain.

While many Europeans saw the June cyber attack as just another wild disruption caused by anonymous hackers, it was identified quickly by experts, like Victor Zhora CEO of Infosafe, as another targeted assault on Ukraine. Most likely launched by Russia, it was timed to infect the country’s networks on the eve of Ukraine’s Constitution Day.

The cyberattack started through a software update for an accounting program that businesses use when working with Ukrainian government agencies, according to the head of Ukraine’s cyber-police, Sergey Demedyuk. In an interview with VOA in his office in the western suburbs of Kyiv, Demedyuk said, “every year cyberattacks are growing in number.”

“Sometimes when targeting a particular government agency or official, they mount complex attacks, first using some disguising action, like a denial-of-service attack, and only then launch their main attack aiming, for example, at capturing data,” he said.

Ukraine’s 360-member cyber police department was formed in 2015. The department is stretched, having not only to investigate cybercrime by non-state actors but also, along with a counterpart unit in the state security agency, defend the country from cyberattacks by state actors. Demedyuk admits it is a cat-and-mouse game searching for viruses and Trojan horses that might have been planted months ago.

Eye of the digital storm

Since the 2014 ouster of pro-Russian President Viktor Yanukovych, Ukraine has been in the eye of a sustained and systematic digital storm of big and small cyberattacks with practically every sector of the country impacted, including media, finance, transportation, military, politics and energy. Sometimes, the intrusions are highly tailored; other times, more indiscriminate attacks like Petya are launched at Ukraine.

Russian officials deny they are waging cyber warfare against Ukraine. Zhora, like many cybersecurity experts, acknowledges it is difficult, if not impossible most times, to trace cyberattacks back to their source.

“Attribution is the most difficult thing. When you are dealing with professional hackers it is hard to track and to find real evidence of where it has come from,” he said. “But we know only one country is the likely culprit. We only really have one enemy that wants to destroy Ukrainian democracy and independence,” he added.

Ukraine’s president, Petro Poroshenko, has been less restrained in pointing the finger of blame. Last December, he said there had been 6,500 cyberattacks on 36 Ukrainian targets in the previous two months alone. Investigations, he said, point to the “direct or indirect involvement of [the] secret services of Russia, which have unleashed a cyberwar against our country.”

Ukraine’s cyber-police head agrees. Demedyuk says his officers have been able to track attacks, especially denial-of-service intrusions, back to “Russian special services, tracking them to their own facilities and their own IP addresses.” But the original source of more complex intrusions, he said, are much harder to identify, with the hackers disguising themselves by using servers around the world, including in Asia and China.

Digital weapons refined

Digital intrusions have seen data deleted and networks crippled with real life consequences. And digital weapons are being refined often with the knowledge gained from each intrusion.

Zhora cites as an example of this evolution the difference between two large cyberattacks on the country’s electricity grid, the first in December 2015 and the second at the end of last year, which cut off energy to hundreds of thousands of people for several hours.

With the first attack the hackers used malware to gain access to the networks and then shut the system down manually.

“They sent an email and when someone opened it, the payload was downloaded and later it spread across the network and they used the path created for the hackers to get to the administrator’s work station and then in a live session switched off the subsystems overseeing electricity distribution,” he said.

But with the 2016 attack no live session was necessary.

“They used a malware which opened the doors automatically by decoding specific protocols and there was no human interaction. I think they got a lot of information in the first attack about the utility companies’ networks and they used the knowledge to write the malware for the second intrusion,” he said.

Digital threats to US

In his speech midweek in Washington, Coats specifically cited possible digital threats to America’s critical infrastructure, including electrical grids and other utilities, saying it is of rising concern.

“It doesn’t take much effort to imagine the consequences of an attack that knocks out power in Boston in February or power in Phoenix in July,” he said.

After the second cyberattack on Ukraine’s electrical grid, a group of American government and private sector energy officials was dispatched to Kyiv, where they spent a month exploring what happened, according to Ukrainian officials.

One lesson the visitors drew was that it would be much harder in the US to switch the grid back on after an intrusion. The Ukrainians were able to get the electricity moving again by visiting each substation and turning the system on again manually, an option apparently more challenging in the US, where grid systems are even more automated.

“Virtual attacks are every bit as dangerous as military ones, we are living on a battlefield,” Zhora said.

Ein News

You Might Also Read:

Who Is Behind Petya?:

Ukrainian Security Call in FBI, NCA & Europol:

 

« Kaspersky Says We Can Trust Him
In Demand: New Tech Against Drone Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.

Valmet

Valmet

Valmet is a leading global developer and supplier of process technologies, automation and services for the pulp, paper and energy industries.