Update: The Online War In Ukraine

Russia's war in Ukraine is the first conflict to use the Internet as an alternative front-line. The cyber attacks are increasing and there is an increase in online censorship, the spread of disinformation, and Ukraine's Internet facing disruption as missiles fall. 

Unfolding events in Ukraine 12 days after the invasion began are sparking international outrage and alarm. President Putin’s war aims and his long record of denying Ukraine’s right to exist paint an even darker picture of what may now lie ahead. 

Russia’s communications regulator Roskomnadzor, which is the Russian federal executive agency responsible for monitoring, controlling and censoring Russian mass media, has ordered media outlets in the country to remove reports describing the attacks on Ukraine as an “assault, invasion, or declaration of war”, or face being blocked and fined. Roskomnadzor has accused several independent media outlets of spreading “unreliable socially significant untrue information” about the shelling of Ukrainian cities by the Russian army and civilian deaths.

Conti Ransomware Group Penetrated

Recently, Ukrainian research group leaked 60,694 messages belonging to the Conti ransomware operation after the announcement of the group of its support to Russia. they were able to access the database XMPP chat server of the Conti group. 

The researchers who leaked Conti's data say there is more to come, including the source for their ransomware and their  administrative console. The attack will have a significant impact on the operation of the gang, considering especially as many Conti’s criminal affiliates are Ukrainian groups. 

Distrupted Communications

Internet access is intermittent, as bombs and missiles are damaging telecoms networks and equipment. The city of Kharkiv saw significant disruption, with connectivity to Ukraine's main internet provider, GigaTrans, dropping below 20% of normal levels,  according to NetBlocks.

There has been continued hacking against Ukraine, with denial-of-service attacks hitting government websites and the emergence of what looks like ransomware without the ability to recover data. This "wiper" malware - "intended to be destructive and designed to render targeted devices inoperable" - had been found in dozens of Ukrainian systems across the government, non-profit and information technology sectors, according to Microsoft.

Entrepreneur Elon Musk has  responded to calls for his satellite broadband service, Starlink, to be made available in Ukraine. On Monday, Mykhailo Fedorov, Ukraine's Minister of Digital Transformation, confirmed the country had received crucial terminals required for the system to work. 

  • In the UK, mobile operators, including O2, Vodafone, Three and EE, have made mobile calls to Ukraine free, with no additional roaming charges for those in the country.
  • Anonymous, the hacking group, has declared cyber-war on the Russian government and it has reportedly hacked state TV channels to show pro-Ukraine content.
  • The Ukrainian MP Kira Rudik has been tweeting a picture of herself with an AK47. The photo is taken not in a base or even in an office, but clearly in the living room of her home.

Impact On Social Media

At the request of the Ukrainian government, both Facebook and Google have restricted access to some state media accounts in Ukraine and banned downloads of the Russia Today TV new channel mobile app. Facebook has taken down a network run by people in Russia and Ukraine for "inauthentic behaviour", posing as independent news entities and creating fake personas across its channels.

NetBlocks has reported thst access to Twitter had been  restricted across every major Russian telecom provider.

Russia's government has imposed partial blockades on Facebook and Twitte ansd Roskomnadzor has accused Facebook of "violating the rights and freedoms of Russian citizens", after Facebook's parent compnay, Meta,  refused to stop fact-checking and labelling content from state-owned news organisations.

Events In Russia

The roots of today’s war extend over 20 years to the beginning of the Putin’s regime and President Putin has not concealed his contempt for Ukrainian independence, which he regards as an accident of history and the most painful of the many injustices brought about by the 1991 Soviet collapse. In summer 2021, President Putin shared his conspiratorial vision of Ukrainian history in a rambling essay that dismissed the entire notion of Ukrainian statehood and blaming  the early Soviet authorities for handing over ancestral Russian lands to Ukraine and other Soviet republics.

The Russian government is reported to have compiled  lists of Ukrainian politicians, journalists, and activists who will be subjected to arrest and possible execution if Russia succeeds in occupying Ukraine’s major cities. 

Given the scale and ferocity of popular opposition to the Russian invasion, any pacification campaign in occupied areas of Ukraine would most likely be violently repressive, although commentators say that President Putin is  supported by the majority Russians who have not been exposed to news that contradicts the version of events in  Ukraine supplied by their domestic news outlets. 

Micosoft:   Roskomnadzor:   Atlantic Council:    UnHerd:     Kira Rudik / Twitter:     Intelx.io:     BBC:     

Security Affairs:     AlJazeera:    ABC:     Netblocks

You Might Also Read: 

The Online Battle In Ukraine Pt.1 :

 

« Ukraine Targeted With Ghostwriter Phishing Campaign
Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

One82

One82

Serving emerging small and medium-sized businesses in California and neighboring regions for over 20 years, One82 has established itself as the most dependable provider of IT support services.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.