Ukraine Battles To Combat Election Hackers

Ukraine's cepital Kiev has recently become a centre for  training and tests which include numerous IT and cyber experts and a hundred pretend hackers as a plan to stop Russia from hacking into the crucial March 31 Presidential Election. At the headquarters of Ukraine's security service, the SBU, more than a dozen local and Western security experts watch a simulated foreign cyber-attack on several big screens. 

During the exercise some of the Westerners became ‘hackers’ taking down the government’s election while some Ukrainian experts tried to stop them.

"Russia is carrying out cyber-attacks to inflict maximum damage," said Oleksandr Klymchuk, a senior counter-intelligence official at the SBU.

Russia has been accused of meddling in elections in the United States and the EU and the West believes that Moscow wants alter the Ukraine vote using fake news and deception electioneers and canvassers in the news and social media.

Moscow has denied these claims of hacking and fake propaganda.

Jakub Kalensky of the recently-created Ukrainian Election Task Force suggested that the Kremlin did not support a specific candidate but sought to discredit the upcoming election altogether.

"It's like a husband who can't get used to the fact that his wife has decided that she doesn't want to live with him anymore. OK so I'll just beat you," he told AFP. "That's Vladimir Putin".

The popularist uprising in Kiev ousted a Kremlin-backed regime in 2014 and Russia retaliated by annexing Crimea. 
This conflict has killed almost 13,000 people to date. The SBU intelligence group says that there have already been several Russian cyber-attacks against the central election commission even though the election commission using the Ukrainian Election Task Force has now installed very modern new software and systems for improved cyber-security protection and also the critical infrastructure such as banks, power grids and telephone networks.

Russia will do so "in order to suggest that the authorities are not in control and to undermine the integrity of the electoral count," the group said. Also a US special envoy to Ukraine Kurt Volker has said that Russian involvement is "already happening" via social media and fake news. He said that Russia was trying to take down or at least weaken President Petro Poroshenko.

"They very much want to see him removed from power and I think they're hoping that they will be able to cut some kind of deal that favours Russia with a new government."

The 53-year-old's victory is far from assured, with actor and comedian Volodymyr Zelensky, 41, who is trying to take over and is currently leading opinion polls.

Facebook which has been accused of not doing enough to fight alleged Russian interference in the 2016 US election, has now said it will do much more to stop fake news and will not publish foreign election advertising before the Ukraine election vote. 

"We recently removed a network of Facebook and Instagram accounts for engaging in coordinated inauthentic behaviour as part of a network that originated in Russia and operated in Ukraine," Facebook said in a statement to AFP.

News by CSI

You Might Also Read:

Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar:

 

 

 

 

« Quantum Computing Will Break Encryption
Company Directors Must Become Cyber Aware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.

GoCloud Systems

GoCloud Systems

GoCloud is an IT consulting firm. We provide IT strategy and cloud adoption services to the New Zealand Government, Non-Profit Organisations and private industry.