Russia Will Keep Up Cyber Attacks For Geo-Political Influence

The Russian Federation is sure to use cyber attacks as one of the tools of the geopolitical impact. Oleg Frolov, the deputy head of the SBU, Ukraine's security service said this during the first conference of leaders of counter-terrorism agencies of UN member states in New York.

'A number of powerful and complicated attacks, cynical by design and catastrophic by potential consequences, on the networks of energy, banking and transport sectors of Ukraine's economy and the communication networks, have once again shown the intentions of the aggressor to use cyber-attacks as one of the tools of geopolitical influence', he said.

Over the past several months, Russian hackers have been trying to infect the computers and networks of Ukrainian companies with malware, so as to create the backdoors for a large-scale attack. Serhiy Demedyuk, the head of the Cyber Police of Ukraine said this as quoted by Reuters. 

 According to him, the malefactors attack companies in various sectors of the economy, but most often, their targets would be banks and energy sector enterprises.  

Demedyuk added that judging by the structure of the malware, the hackers plan to conduct the major attack on a particular day. 'According to our research, the hackers spread the malware, which is divided into various components, sent from different sources, to avoid being detected by the anti-virus software. When assembled on one device, these components combine into the malware, which deals the actual damage.

According to Frolov, propaganda became one of the key components of the hybrid aggression against Ukraine; it created the playground for unfurling an entire arsenal of other conventional and non-conventional methods of waging war, such as using illegal armed units, initialing internal disorders, resorting to cyber-attacks and economic pressure. 

Besides, the Internet is used to spread radical ideas, recruiting supporters and funding the illegal activity, related to terrorism.
The Ukrainian side also mentioned the necessity to join efforts in the struggle against terrorism and extremism. 

Currently, the Ukrainian police cooperate with the foreign agencies in order to find these hackers. Demedyuk assured that the Ukrainian side is now much better prepared to deter potential attacks, like the one that happened exactly one year ago, on June 27, 2017, when ransomware called Petya when hit thousands of computers in Ukraine and abroad, encrypting the data stored on these devices and demanding money in exchange for the 'decryption'.

112.UA:           112:UA

You Might Also Read:

Ukraine Says Russian Hackers Are Preparing A Massive Strike:

America Can Learn About Russian Disinformation From Europe:

 

 

« Coast Guard Academy Creates New Cybersystems Program
Is Cyber The Perfect Weapon? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Carbon Black

Carbon Black

Carbon Black delivers the industry’s most complete endpoint security platform.

Soverus Security Solutions

Soverus Security Solutions

Soverus cyber security services and solutions include regulatory compliance, risk assessments, audits, security architecture design, solution delivery, technical support and training

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.