www.infosecurity-magazine.com
Open in
urlscan Pro
3.160.39.76
Public Scan
URL:
https://www.infosecurity-magazine.com/news/russian-cyberattacks-ukraines/
Submission: On September 24 via api from TR — Scanned from DE
Submission: On September 24 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
<button type="submit" class="form-button with-icon">
<svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
<path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg>
</button>
</form>
GET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
<input type="submit" value="Search" class="form-button">
</form>
Text Content
* Log In * Sign Up * * News * Magazine Features * Opinions * News Features * Interviews * Editorial * Blogs * Reviews * Slackspace * Next-Gen Infosec * Webinars * White Papers * Podcasts * Industry Events & Training * Magazine Events * Online Summits * Company Directory * Application Security * Automation * Big Data * Business Continuity * Cloud Security * Compliance * Cybercrime * Data Protection * Digital Forensics * Encryption * Human Factor * Identity Access Management * Industry Announcements * Internet Security * Malware * Managed Services * Mobile Security * Network Security * Payment Security * Physical and Information Security Convergence * Privacy * Risk Management * The Internet of Things * Log In * Sign Up * * News * Topics * Features * Webinars * White Papers * Podcasts * EventsEvents & Conferences * Directory * * Infosecurity Magazine Home » News » Russian Cyber-Attacks Home in on Ukraine’s Military Infrastructure RUSSIAN CYBER-ATTACKS HOME IN ON UKRAINE’S MILITARY INFRASTRUCTURE News 23 Sep 2024 WRITTEN BY KEVIN POIREAULT Reporter, Infosecurity Magazine * Follow @Kpoireault * Connect on LinkedIn * * * Russian-aligned threat actors are moving away from broad information stealing campaigns across Ukraine to focus on cyber espionage targeting military infrastructure, Ukraine authorities have found in their latest mid-year cyber report. Cyber-attacks against Ukraine’s security and defense sectors doubled between the second half of 2023 (111) and the first half of 2024 (276), according to analysis by Ukraine’s State Service of Special Communications and Information Protection (SSSCIP). In its Russian Cyber Operations (H1 2024) report, the SSSCIP observed that Russian-aligned adversaries primarily focused on anything directly connected to the theater of war and attacks on service providers during the first half of 2024. Notably, five threat groups attributed to Russia, UAC-0184, UAC-0020, UAC-0149, UAC-0200, and UAC-0180, were particularly active, using various versions of remote access Trojans (RATs) and other malware to maintain and remotely control compromised Windows computers belonging to members of the Ukrainian Defense Forces. This new strategy has evolved since 2022, when Russian threat actors primarily attempted to dismantle IT infrastructures of organizations within the critical infrastructure sector and exfiltrate databases and personal data details. Then, in 2023, their main goal was to collect information across all Ukrainian sectors. 19% RISE OF CYBER-ATTACKS TARGETING UKRAINE The SSSCIP report also showed that overall registered cyber incidents amounted to 1739 in the first half of 2024, a 19% rise compared to the previous reported period. However, this increase is mainly due to a boom in low - and medium-severity incidents, while high- and critical-severity incidents decreased. Finally, the report found that cyber adversaries targeting Ukraine have increased their reliance on malware to conduct their campaigns, with 196 infections, including malicious software in the first half of 2024 from 103 during the previous period. This trend is mainly due to an increased use of pirated software pre-packaged with backdoors. “We must also emphasize that providing licensed software such as Windows, Office, EDR, MDM, SIEM, and IDM is critically important for both Ukrainian military and civilian organizations to avoid vulnerabilities arising from malware infections through unlicensed software,” the report concluded. The report was based on data collected by CERT-UA, SOC-SSCIP, and other SSSCIP cyber divisions. YOU MAY ALSO LIKE 1. RUSSIA'S SANDWORM UPGRADED TO APT44 BY GOOGLE'S MANDIANT News18 Apr 2024 2. RUSSIAN APT SANDWORM DISRUPTED POWER IN UKRAINE USING NOVEL OT TECHNIQUES News9 Nov 2023 3. MANDIANT UNVEILS RUSSIAN GRU'S CYBER PLAYBOOK AGAINST UKRAINE News13 Jul 2023 4. RUSSIA'S CYBER TACTICS IN UKRAINE SHIFT TO FOCUS ON ESPIONAGE News7 Mar 2023 5. RUSSIA: CYBER-ATTACKS COULD ESCALATE MILITARY CONFLICT News10 Jun 2022 WHAT’S HOT ON INFOSECURITY MAGAZINE? * Read * Shared * Watched * Editor's Choice GOING FOR GOLD: HSBC APPROVES QUANTUM-SAFE TECHNOLOGY FOR TOKENIZED BULLIONS News20 Sep 2024 1 NIST FORMALIZES WORLD'S FIRST POST-QUANTUM CRYPTOGRAPHY STANDARDS News13 Aug 2024 2 US CYBERSPACE SOLARIUM COMMISSION OUTLINES TEN NEW CYBER POLICY PRIORITIES News20 Sep 2024 3 CYBERSECURITY SKILLS GAP LEAVES CLOUD ENVIRONMENTS VULNERABLE News20 Sep 2024 4 GOOGLE STREET VIEW IMAGES USED FOR EXTORTION SCAMS News18 Sep 2024 5 INFOSTEALERS CAUSE SURGE IN RANSOMWARE ATTACKS, JUST ONE IN THREE RECOVER DATA News19 Sep 2024 6 NIST FORMALIZES WORLD'S FIRST POST-QUANTUM CRYPTOGRAPHY STANDARDS News13 Aug 2024 1 GOING FOR GOLD: HSBC APPROVES QUANTUM-SAFE TECHNOLOGY FOR TOKENIZED BULLIONS News20 Sep 2024 2 HALF OF UK FIRMS LACK BASIC CYBERSECURITY SKILLS News16 Sep 2024 3 OVER HALF OF BREACHED UK FIRMS PAY RANSOM News17 Sep 2024 4 ADVANCED PHISHING ATTACKS PUT X ACCOUNTS AT RISK News16 Sep 2024 5 UK HOSTS INTERNATIONAL CYBER SKILLS CONFERENCE News16 Sep 2024 6 LEARN KEY STRATEGIES FOR INDUSTRIAL DATA SECURITY Webinar27 Jun 2024 1 SECURING APIS IN THE CLOUD FRONTIER Webinar20 Mar 2024 2 BOUNCING BACK: BUILDING ORGANIZATIONAL RESILIENCE IN THE FACE OF CYBER-ATTACK Webinar20 Mar 2024 3 PHISHING, IMPERSONATION, AND BEYOND: CISO INSIGHTS ON 2023-2024 EXTERNAL THREATS Webinar15 Feb 2024 4 DISINFORMATION DEFENSE: PROTECTING BUSINESSES FROM THE NEW WAVE OF AI-POWERED CYBER THREATS Webinar20 Mar 2024 5 UNTANGLING THE WEB: NAVIGATING THIRD-PARTY RISK IN A HYPERCONNECTED WORLD Webinar19 Mar 2024 6 INFOSECURITY MAGAZINE AUTUMN ONLINE SUMMIT 2024: DAY ONE Online Summit09:45 – 15:00 BST, 10 Sep 2024 1 INFOSECURITY MAGAZINE AUTUMN ONLINE SUMMIT 2024: DAY TWO Online Summit10:00 – 15:00 EDT, 11 Sep 2024 2 CLARK COUNTY CIO SHARES INSIGHTS ON SECURING AI INNOVATION AND BROADBAND INITIATIVES Interview19 Aug 2024 3 FROM PROTESTS TO PROFIT: WHY HACKTIVISTS ARE JOINING THE RANSOMWARE RANKS News Feature28 Aug 2024 4 IRANIAN HACKERS SECRETLY AID RANSOMWARE ATTACKS ON US News29 Aug 2024 5 POST-COMPROMISE SECURITY: WHAT TO DO WHEN THE HACKERS GET IN News Feature20 Aug 2024 6 THE MAGAZINE * About Infosecurity * Meet the team * Contact us ADVERTISERS * Media pack CONTRIBUTORS * Forward features * Op-ed * Next-gen submission * * * * Copyright © 2024 Reed Exhibitions Ltd. * Terms and Conditions * Privacy Policy * Intellectual property statement * Cookies Settings * Cookie Policy * Sitemap We use cookies to analyse and improve our service, to improve and personalise content, advertising and your digital experience. We also share information about your use of our site with our social media, advertising and analytics partners. Cookie Policy Accept All Cookies Cookies Settings COOKIE PREFERENCE CENTRE We process your information, to deliver content or advertisements and measure the delivery of such content or advertisements, extract insights, and generate reports to understand service usage; and/or accessing or storing information on devices for that purpose. You can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more, to change our default settings, and/or view the list of Google Ad-Tech Vendors. Cookie Policy MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors All Consent Allowed Confirm My Choices