Ukraine Accuses Russia Of Ransomware Attack

Ukraine has accused Russia of launching cyber-attacks on public and private entities. The attack which took place on June 27th, 2017 disrupted the work of public and private institutions by locking down their databases.

The initial analysis made by some security experts said that the attack was a Petya malware attack. But experts from Kaspersky later confirmed that the attack was NotPetya ransomware, but was a different malware having characteristic features of Petya.

Ukraine’s security services Sluzhba Bezpeky Ukrayiny (SBU) released a fresh statement recently which says that the attack was Launched Russian hackers who are basically state funded actors operating for Russian military intelligence.

SBU’s statement added that the cyber assault was launched to spread panic among the populace of Ukraine and to disrupt the daily workflow of the companies.

The SBU also released a statement which said that law enforcement agencies have seized equipment which is believed to be of Russian agents who were intending to launch a cyber-attack on May and June of this year on Ukraine and some other countries.

However, the security agency of Ukraine was reluctant to add further details on this note.
 
Meanwhile, Kremlin sharply criticised the behavior and public statements made by Ukraine. A spokesperson from Kremlin released a public statement just a couple of hours ago and it says that the allegations are simply “unfounded blanket accusations”.

Ukraine’s security agency SBU, however, choose to remain silent on the cyber-attack which was launched for the second time on companies operating in its region recently.

United States NSA reacted to the statement of Ukraine and said that it was not at all surprised when it heard that Russia was behind the NotPetya ransomware attack which happened early July.

The law enforcement agency of America also issued a warning to other nations by saying that their entire critical infrastructure is vulnerable to hackers funded by Russia and asked them to buck up the security provisions of their infrastructure as soon as possible.

Cybersecurity Insiders

You Might Also Read: 

Ukraine Police Trace Petya Attack Source:

Poland Strengthens Cybersecurity Against Russian Threat:

 

« British Businesses Are Unaware Of Data Protection Laws
Cyber Attacks Demonstrate Why The Cloud Is Safer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.