NATO & Ukraine Agree Deeper Cyber Co-operation

NATO has quickly signed a deal with Ukraine to strengthen its cyber support after a damaging attack against Kyiv, when more than 70 government websites were hacked. Ukrainian government computer systems were pentrated and covert 'wiper' malware installed

It appears that the malware lay dormant on some systems for months before dropping their malicious code onto the networks. 

These attacks have prompted fears that Russia could be plotting an invasion and according to the Ukrainian Digital Development Ministry “All evidence indicates that Russia is behind the cyber attack." The Kremlin has denied Russian involvement. 

The intrusions were only discovered when dozens of government agencies in Ukraine were suddenly targeted in a defacement campaign in which hackers replaced the main web page of about a dozen sites with a politically charged message and attempted to deface others. The same day the defacements occurred, Microsoft discovered the destructive wiper code on the systems of a handful of entities in Ukraine, this included government agencies and at least one IT company now believed to be the Ukrainian software and web site development firm called Kitsoft.

NATO Security General Jens Stoltenberg said experts were already working with Ukraine to tackle these most recent cyber attack. 

The new agreement with Ukraine will enhance cyber cooperation and allow Ukrainian access to NATO’s malware information sharing platform and identify where training may be needed for Ukrainian personnel. The recent cyber attacks on Ukraine came as tensions have soared between Moscow and the West over allegations the Kremlin could be plotting a fresh incursion into its neighbour after massing some 100,000 troops at the border. Western allies have warned that a land invasion of Ukraine could be preceded by a hacking attack to knock out key infrastructure in Ukraine. 

Microsoft has said that the recent cyber attacks could prove destructive and affect more organisations than initially feared, adding that it was continuing to analyse the malware and warned it could render government digital infrastructure inoperable. 

Described as a possible Master Boot Record (MBR) wiper, Microsoft says the malware is executed when an impacted device is powered down and disguises itself as ransomware, but lacks a ransom recovery mechanism and is intended to be destructive and permanently disable targeted devices.

Moscow and NATO allies failed to make a breakthrough to ease tensions over Ukraine at high-stakes talks last week. The Kremlin has laid down a series of demands to NATO and the United States, including ruling out granting Ukraine membership in the alliance.

NATO Secretary General Jens Stoltenberg said that experts from NATO and its members were already on the ground, working with Ukraine to tackle the latest cyber attack. Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

NATO:      Microsoft:    Zero Day:    Talos:     Oodaloop:     Security Week:    Times of Israel:     

Ecomonic Times:    AA / Anodolu 

You Might Also Read: 

Russian Turla Hackers Specialise In Attacking  Government Agencies:

 

 

« The Next 9/11 Will Be A Cyber Attack
Red Cross Hacked - Half A Million Victims At Risk »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

TR-CERT (USOM)

TR-CERT (USOM)

TR-CERT (Ulusal Siber Olaylara Müdahale Merkezi - USOM) is the national Computer Emergency Response Team of Turkey.