Russia’s Digital Weapons Refined Against Ukraine

The Petya virus, targeting Microsoft Windows-based systems, spread like wildfire across Europe and, to a lesser extent, America, affecting hundreds of large and small firms in France, Germany, Italy, Poland and Britain.

While many Europeans saw the June cyber attack as just another wild disruption caused by anonymous hackers, it was identified quickly by experts, like Victor Zhora CEO of Infosafe, as another targeted assault on Ukraine. Most likely launched by Russia, it was timed to infect the country’s networks on the eve of Ukraine’s Constitution Day.

The cyberattack started through a software update for an accounting program that businesses use when working with Ukrainian government agencies, according to the head of Ukraine’s cyber-police, Sergey Demedyuk. In an interview with VOA in his office in the western suburbs of Kyiv, Demedyuk said, “every year cyberattacks are growing in number.”

“Sometimes when targeting a particular government agency or official, they mount complex attacks, first using some disguising action, like a denial-of-service attack, and only then launch their main attack aiming, for example, at capturing data,” he said.

Ukraine’s 360-member cyber police department was formed in 2015. The department is stretched, having not only to investigate cybercrime by non-state actors but also, along with a counterpart unit in the state security agency, defend the country from cyberattacks by state actors. Demedyuk admits it is a cat-and-mouse game searching for viruses and Trojan horses that might have been planted months ago.

Eye of the digital storm

Since the 2014 ouster of pro-Russian President Viktor Yanukovych, Ukraine has been in the eye of a sustained and systematic digital storm of big and small cyberattacks with practically every sector of the country impacted, including media, finance, transportation, military, politics and energy. Sometimes, the intrusions are highly tailored; other times, more indiscriminate attacks like Petya are launched at Ukraine.

Russian officials deny they are waging cyber warfare against Ukraine. Zhora, like many cybersecurity experts, acknowledges it is difficult, if not impossible most times, to trace cyberattacks back to their source.

“Attribution is the most difficult thing. When you are dealing with professional hackers it is hard to track and to find real evidence of where it has come from,” he said. “But we know only one country is the likely culprit. We only really have one enemy that wants to destroy Ukrainian democracy and independence,” he added.

Ukraine’s president, Petro Poroshenko, has been less restrained in pointing the finger of blame. Last December, he said there had been 6,500 cyberattacks on 36 Ukrainian targets in the previous two months alone. Investigations, he said, point to the “direct or indirect involvement of [the] secret services of Russia, which have unleashed a cyberwar against our country.”

Ukraine’s cyber-police head agrees. Demedyuk says his officers have been able to track attacks, especially denial-of-service intrusions, back to “Russian special services, tracking them to their own facilities and their own IP addresses.” But the original source of more complex intrusions, he said, are much harder to identify, with the hackers disguising themselves by using servers around the world, including in Asia and China.

Digital weapons refined

Digital intrusions have seen data deleted and networks crippled with real life consequences. And digital weapons are being refined often with the knowledge gained from each intrusion.

Zhora cites as an example of this evolution the difference between two large cyberattacks on the country’s electricity grid, the first in December 2015 and the second at the end of last year, which cut off energy to hundreds of thousands of people for several hours.

With the first attack the hackers used malware to gain access to the networks and then shut the system down manually.

“They sent an email and when someone opened it, the payload was downloaded and later it spread across the network and they used the path created for the hackers to get to the administrator’s work station and then in a live session switched off the subsystems overseeing electricity distribution,” he said.

But with the 2016 attack no live session was necessary.

“They used a malware which opened the doors automatically by decoding specific protocols and there was no human interaction. I think they got a lot of information in the first attack about the utility companies’ networks and they used the knowledge to write the malware for the second intrusion,” he said.

Digital threats to US

In his speech midweek in Washington, Coats specifically cited possible digital threats to America’s critical infrastructure, including electrical grids and other utilities, saying it is of rising concern.

“It doesn’t take much effort to imagine the consequences of an attack that knocks out power in Boston in February or power in Phoenix in July,” he said.

After the second cyberattack on Ukraine’s electrical grid, a group of American government and private sector energy officials was dispatched to Kyiv, where they spent a month exploring what happened, according to Ukrainian officials.

One lesson the visitors drew was that it would be much harder in the US to switch the grid back on after an intrusion. The Ukrainians were able to get the electricity moving again by visiting each substation and turning the system on again manually, an option apparently more challenging in the US, where grid systems are even more automated.

“Virtual attacks are every bit as dangerous as military ones, we are living on a battlefield,” Zhora said.

Ein News

You Might Also Read:

Who Is Behind Petya?:

Ukrainian Security Call in FBI, NCA & Europol:

 

« Kaspersky Says We Can Trust Him
In Demand: New Tech Against Drone Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.