NATO & Ukraine Agree Deeper Cyber Co-operation

NATO has quickly signed a deal with Ukraine to strengthen its cyber support after a damaging attack against Kyiv, when more than 70 government websites were hacked. Ukrainian government computer systems were pentrated and covert 'wiper' malware installed

It appears that the malware lay dormant on some systems for months before dropping their malicious code onto the networks. 

These attacks have prompted fears that Russia could be plotting an invasion and according to the Ukrainian Digital Development Ministry “All evidence indicates that Russia is behind the cyber attack." The Kremlin has denied Russian involvement. 

The intrusions were only discovered when dozens of government agencies in Ukraine were suddenly targeted in a defacement campaign in which hackers replaced the main web page of about a dozen sites with a politically charged message and attempted to deface others. The same day the defacements occurred, Microsoft discovered the destructive wiper code on the systems of a handful of entities in Ukraine, this included government agencies and at least one IT company now believed to be the Ukrainian software and web site development firm called Kitsoft.

NATO Security General Jens Stoltenberg said experts were already working with Ukraine to tackle these most recent cyber attack. 

The new agreement with Ukraine will enhance cyber cooperation and allow Ukrainian access to NATO’s malware information sharing platform and identify where training may be needed for Ukrainian personnel. The recent cyber attacks on Ukraine came as tensions have soared between Moscow and the West over allegations the Kremlin could be plotting a fresh incursion into its neighbour after massing some 100,000 troops at the border. Western allies have warned that a land invasion of Ukraine could be preceded by a hacking attack to knock out key infrastructure in Ukraine. 

Microsoft has said that the recent cyber attacks could prove destructive and affect more organisations than initially feared, adding that it was continuing to analyse the malware and warned it could render government digital infrastructure inoperable. 

Described as a possible Master Boot Record (MBR) wiper, Microsoft says the malware is executed when an impacted device is powered down and disguises itself as ransomware, but lacks a ransom recovery mechanism and is intended to be destructive and permanently disable targeted devices.

Moscow and NATO allies failed to make a breakthrough to ease tensions over Ukraine at high-stakes talks last week. The Kremlin has laid down a series of demands to NATO and the United States, including ruling out granting Ukraine membership in the alliance.

NATO Secretary General Jens Stoltenberg said that experts from NATO and its members were already on the ground, working with Ukraine to tackle the latest cyber attack. Relations between NATO and Ukraine date back to the early 1990s. Cooperation has deepened over time and is mutually beneficial, with Ukraine actively contributing to NATO-led operations and missions.

NATO:      Microsoft:    Zero Day:    Talos:     Oodaloop:     Security Week:    Times of Israel:     

Ecomonic Times:    AA / Anodolu 

You Might Also Read: 

Russian Turla Hackers Specialise In Attacking  Government Agencies:

 

 

« The Next 9/11 Will Be A Cyber Attack
Red Cross Hacked - Half A Million Victims At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

ProtonMail

ProtonMail

ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.