Russia Escalates Spying On Ukraine’s Allies

Russian state-backed hackers have conducted network spying and espionage activities against 128 organisations in 42 countries allied to Ukraine since the start of the war, according to Microsoft in it’s new findings published Wednesday 22nd of June.

Defending Ukraine: Early Lessons from the Cyber War is the report conducted by Microsoft’s threat intelligence and data science teams with the goal of sharpening our understanding of the threat landscape in the ongoing war in Ukraine.

“Microsoft has seen the Russian military launch multiple waves of destructive cyber-attacks against 48 distinct Ukrainian agencies and enterprises,” Brad Smith, the President and Vice Chair of Microsoft, said. “These have sought to penetrate network domains by initially comprising hundreds of computers and then spreading malware designed to destroy the software and data on thousands of others... Since the start of the war, the Russian targeting (of Ukraine’s allies) has been successful 29 percent of the time.”  

NATO is currently a focused target for Russia' computer operatives, according to the Microsoft report. 

American organisations are high on the list for the Russian hacking attacksoutside of Ukraine, according to Microsoft, but these Russian hacks include 42 countries which might have potential war information such as governments, firms, think tanks and humanitarian organisations. 

Those hacking attempts have successfully penetrated defenses 29% of the time, according to Microsoft. Of those successful breaches, a quarter resulted in data stolen from networks.  But Microsoft said it didn't have a full view of the hacking because some customers stored data on their own systems rather than in Microsoft's cloud computing infrastructure.

US Cyber Command, the military's hacking unit, has conducted a "full spectrum" of offensive, defensive and information operations in support of Ukraine and China has employed and trained some highly effective hackers on targets related to the Ukraine war, according to cyber security researchers. Furthermore, Suspected Chinese hackers appeared to try to break into computers linked to officials in the Russian city of Blagoveshchensk, near the Chinese border, according to Secureworks

Ukrainian officials have also accused the Russians of routing Internet traffic in parts of Ukraine through Russian Internet providers and subjecting those connections to censorship. 

Background 

The recorded history of every war typically includes an account of the first shots fired and who witnessed them. Each account provides a glimpse not just into the start of a war, but the nature of the era in which people lived. Historians who discuss the first shots in America’s Civil War in 1861 typically describe guns, cannons, and sailing ships around a fort near Charleston, South Carolina.

Events spiraled toward the launch of World War I in 1914 when terrorists in plain view on a city street in Sarajevo used grenades and a pistol to assassinate the archduke of the Austrian-Hungarian Empire. It would take until the Nuremberg war trials to fully understand what happened near the Polish border 25 years later. In 1939, Nazi SS troops dressed in Polish uniforms and staged an attack against a German radio station. Adolf Hitler cited such attacks to justify a blitzkrieg invasion that combined tanks, planes, and troops to overrun Polish cities and civilians.  Each of these incidents also provides an account of the technology of the time, technology that would play a role in the war that ensued and the lives of the people who lived through it. 

The war in Ukraine has a pattern and as the Russian army crossed the Ukrainian border on February 24th. However, the first shots were in fact fired a day earlier. They involved a cyber weapon called “Foxblade” that was launched against critical computer networks in Ukraine.

Reflecting the technology of our time, those among the first to observe the attack were half a world away, working in the United States.  This captures the importance of stepping back and taking stock of the first several months of the war in Ukraine, which has been devastating for the country in terms of destruction and loss of life, including innocent civilians.

Microsoft:       Secure Works:        Infosecurity Magazine:     CNN:      Reuters:     US News:     NBC

You Might Also Read: 

Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine:

« US Bank Loses Critical Data Of Over A Million Customers - Again
Cyber Security Tools For Your Small Business »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.

Intersys

Intersys

Intersys provides cyber-resilient IT support and services from IT offices in London, Essex and Cambridge.