Ukrainian Mobile Operator Suffers A Large-Scale Cyber Attack 

Ukraine's largest mobile network Kyivstar has suffered a massive cyber attack, knocking the service offline for an extended period from the 12th December. 

The Security Service of Ukraine (SBU) said it had opened criminal proceedings to investigate the the attack on Kyivstar, and that “one of the versions currently being investigated by SBU investigators is that the Russian special services may be behind this hacker attack.”

The Kyivstar network is estimated to have some 24 million mobile customers and a million home internet users and this attack also disrupted the air raid alert systems themselves in parts of Kyiv.

The attack on Kyivstar, which has more than 50% of Ukraine's population as mobile subscribers, was taken out services, damaged IT infrastructure and millions could not receiving mobile warnings of potential Russian air assaults. 

While the company's own website was offline, Kyivstar has posted statement on social media saying that the attack caused a “technical failure” that left customers without mobile connections or internet access. The company's Chief Executive Officer Oleksandr Komarov said the attack was a result of the war with Russia. "War is also happening in cyberspace. Unfortunately, we have been hit as a result of this war... The attack significantly damaged our infrastructure, limited access, we could not counter it at the virtual level, so we shut down Kyivstar physically to limit the enemy's access."  he told national television.

Komarov did not name who he believed to be responsible, but Russian hacktivist group Killnet claimed responsibility for the attack via a statement on the Telegram. Kyivstar's Dutch parent company Veon said it would work with Kyivstar on "additional security measures" to prevent similar incidents in future.

At the same time that Kyivstar came under attack, Monobank, one of Ukraine’s largest financial institutions, said it had also been targeted by hackers. The bank’s co-founder Oleh Gorokhovsky said on Telegram that the organisation had been struck by a “massive DDoS” attack, aimed at knocking services offline.

Ukraine Defence MinistryTSN.UA     OGo/ Telegram:   VEON:   BBC:     Reuters:      XinhuaNet:    Computing

Techcrunch:   Cyberscoop:      The Record:   

You Might Also Read: 

Ukraine’s Cyber Conflict With Russia:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Online Fraud Is Driven By Human Trafficking
Hackers Want Your Pension »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Polymer Solutions

Polymer Solutions

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Digital Craftsmen Ltd

Digital Craftsmen Ltd

We're ISO27001 & Cyber Essentials Cybersecurity experts, delivering full cloud security and managed services. We take a bespoke approach for each client from hosting, optimising & securing them online

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.