Russia’s Digital Weapons Refined Against Ukraine

The Petya virus, targeting Microsoft Windows-based systems, spread like wildfire across Europe and, to a lesser extent, America, affecting hundreds of large and small firms in France, Germany, Italy, Poland and Britain.

While many Europeans saw the June cyber attack as just another wild disruption caused by anonymous hackers, it was identified quickly by experts, like Victor Zhora CEO of Infosafe, as another targeted assault on Ukraine. Most likely launched by Russia, it was timed to infect the country’s networks on the eve of Ukraine’s Constitution Day.

The cyberattack started through a software update for an accounting program that businesses use when working with Ukrainian government agencies, according to the head of Ukraine’s cyber-police, Sergey Demedyuk. In an interview with VOA in his office in the western suburbs of Kyiv, Demedyuk said, “every year cyberattacks are growing in number.”

“Sometimes when targeting a particular government agency or official, they mount complex attacks, first using some disguising action, like a denial-of-service attack, and only then launch their main attack aiming, for example, at capturing data,” he said.

Ukraine’s 360-member cyber police department was formed in 2015. The department is stretched, having not only to investigate cybercrime by non-state actors but also, along with a counterpart unit in the state security agency, defend the country from cyberattacks by state actors. Demedyuk admits it is a cat-and-mouse game searching for viruses and Trojan horses that might have been planted months ago.

Eye of the digital storm

Since the 2014 ouster of pro-Russian President Viktor Yanukovych, Ukraine has been in the eye of a sustained and systematic digital storm of big and small cyberattacks with practically every sector of the country impacted, including media, finance, transportation, military, politics and energy. Sometimes, the intrusions are highly tailored; other times, more indiscriminate attacks like Petya are launched at Ukraine.

Russian officials deny they are waging cyber warfare against Ukraine. Zhora, like many cybersecurity experts, acknowledges it is difficult, if not impossible most times, to trace cyberattacks back to their source.

“Attribution is the most difficult thing. When you are dealing with professional hackers it is hard to track and to find real evidence of where it has come from,” he said. “But we know only one country is the likely culprit. We only really have one enemy that wants to destroy Ukrainian democracy and independence,” he added.

Ukraine’s president, Petro Poroshenko, has been less restrained in pointing the finger of blame. Last December, he said there had been 6,500 cyberattacks on 36 Ukrainian targets in the previous two months alone. Investigations, he said, point to the “direct or indirect involvement of [the] secret services of Russia, which have unleashed a cyberwar against our country.”

Ukraine’s cyber-police head agrees. Demedyuk says his officers have been able to track attacks, especially denial-of-service intrusions, back to “Russian special services, tracking them to their own facilities and their own IP addresses.” But the original source of more complex intrusions, he said, are much harder to identify, with the hackers disguising themselves by using servers around the world, including in Asia and China.

Digital weapons refined

Digital intrusions have seen data deleted and networks crippled with real life consequences. And digital weapons are being refined often with the knowledge gained from each intrusion.

Zhora cites as an example of this evolution the difference between two large cyberattacks on the country’s electricity grid, the first in December 2015 and the second at the end of last year, which cut off energy to hundreds of thousands of people for several hours.

With the first attack the hackers used malware to gain access to the networks and then shut the system down manually.

“They sent an email and when someone opened it, the payload was downloaded and later it spread across the network and they used the path created for the hackers to get to the administrator’s work station and then in a live session switched off the subsystems overseeing electricity distribution,” he said.

But with the 2016 attack no live session was necessary.

“They used a malware which opened the doors automatically by decoding specific protocols and there was no human interaction. I think they got a lot of information in the first attack about the utility companies’ networks and they used the knowledge to write the malware for the second intrusion,” he said.

Digital threats to US

In his speech midweek in Washington, Coats specifically cited possible digital threats to America’s critical infrastructure, including electrical grids and other utilities, saying it is of rising concern.

“It doesn’t take much effort to imagine the consequences of an attack that knocks out power in Boston in February or power in Phoenix in July,” he said.

After the second cyberattack on Ukraine’s electrical grid, a group of American government and private sector energy officials was dispatched to Kyiv, where they spent a month exploring what happened, according to Ukrainian officials.

One lesson the visitors drew was that it would be much harder in the US to switch the grid back on after an intrusion. The Ukrainians were able to get the electricity moving again by visiting each substation and turning the system on again manually, an option apparently more challenging in the US, where grid systems are even more automated.

“Virtual attacks are every bit as dangerous as military ones, we are living on a battlefield,” Zhora said.

Ein News

You Might Also Read:

Who Is Behind Petya?:

Ukrainian Security Call in FBI, NCA & Europol:

 

« Kaspersky Says We Can Trust Him
In Demand: New Tech Against Drone Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.