Russia Will Keep Up Cyber Attacks For Geo-Political Influence

The Russian Federation is sure to use cyber attacks as one of the tools of the geopolitical impact. Oleg Frolov, the deputy head of the SBU, Ukraine's security service said this during the first conference of leaders of counter-terrorism agencies of UN member states in New York.

'A number of powerful and complicated attacks, cynical by design and catastrophic by potential consequences, on the networks of energy, banking and transport sectors of Ukraine's economy and the communication networks, have once again shown the intentions of the aggressor to use cyber-attacks as one of the tools of geopolitical influence', he said.

Over the past several months, Russian hackers have been trying to infect the computers and networks of Ukrainian companies with malware, so as to create the backdoors for a large-scale attack. Serhiy Demedyuk, the head of the Cyber Police of Ukraine said this as quoted by Reuters. 

 According to him, the malefactors attack companies in various sectors of the economy, but most often, their targets would be banks and energy sector enterprises.  

Demedyuk added that judging by the structure of the malware, the hackers plan to conduct the major attack on a particular day. 'According to our research, the hackers spread the malware, which is divided into various components, sent from different sources, to avoid being detected by the anti-virus software. When assembled on one device, these components combine into the malware, which deals the actual damage.

According to Frolov, propaganda became one of the key components of the hybrid aggression against Ukraine; it created the playground for unfurling an entire arsenal of other conventional and non-conventional methods of waging war, such as using illegal armed units, initialing internal disorders, resorting to cyber-attacks and economic pressure. 

Besides, the Internet is used to spread radical ideas, recruiting supporters and funding the illegal activity, related to terrorism.
The Ukrainian side also mentioned the necessity to join efforts in the struggle against terrorism and extremism. 

Currently, the Ukrainian police cooperate with the foreign agencies in order to find these hackers. Demedyuk assured that the Ukrainian side is now much better prepared to deter potential attacks, like the one that happened exactly one year ago, on June 27, 2017, when ransomware called Petya when hit thousands of computers in Ukraine and abroad, encrypting the data stored on these devices and demanding money in exchange for the 'decryption'.

112.UA:           112:UA

You Might Also Read:

Ukraine Says Russian Hackers Are Preparing A Massive Strike:

America Can Learn About Russian Disinformation From Europe:

 

 

« Coast Guard Academy Creates New Cybersystems Program
Is Cyber The Perfect Weapon? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.