www.infosecurity-magazine.com Open in urlscan Pro
3.160.39.76  Public Scan

URL: https://www.infosecurity-magazine.com/news/russian-cyberattacks-ukraines/
Submission: On September 24 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.infosecurity-magazine.com/search/

<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
  <input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
  <button type="submit" class="form-button with-icon">
    <svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
      <path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
    </svg>
  </button>
</form>

GET https://www.infosecurity-magazine.com/search/

<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
  <input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
  <input type="submit" value="Search" class="form-button">
</form>

Text Content

 * Log In
 * Sign Up

 * 

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things

 * Log In
 * Sign Up

 * 
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * EventsEvents & Conferences
 * Directory
 * * 

Infosecurity Magazine Home » News » Russian Cyber-Attacks Home in on Ukraine’s
Military Infrastructure


RUSSIAN CYBER-ATTACKS HOME IN ON UKRAINE’S MILITARY INFRASTRUCTURE

News 23 Sep 2024


WRITTEN BY


KEVIN POIREAULT

Reporter, Infosecurity Magazine

 * Follow @Kpoireault
 * Connect on LinkedIn

 * 
 * 
 * 

Russian-aligned threat actors are moving away from broad information stealing
campaigns across Ukraine to focus on cyber espionage targeting military
infrastructure, Ukraine authorities have found in their latest mid-year cyber
report.

Cyber-attacks against Ukraine’s security and defense sectors doubled between the
second half of 2023 (111) and the first half of 2024 (276), according to
analysis by Ukraine’s State Service of Special Communications and Information
Protection (SSSCIP).

In its Russian Cyber Operations (H1 2024) report, the SSSCIP observed that
Russian-aligned adversaries primarily focused on anything directly connected to
the theater of war and attacks on service providers during the first half of
2024.

Notably, five threat groups attributed to Russia, UAC-0184, UAC-0020, UAC-0149,
UAC-0200, and UAC-0180, were particularly active, using various versions of
remote access Trojans (RATs) and other malware to maintain and remotely control
compromised Windows computers belonging to members of the Ukrainian Defense
Forces.

This new strategy has evolved since 2022, when Russian threat actors primarily
attempted to dismantle IT infrastructures of organizations within the critical
infrastructure sector and exfiltrate databases and personal data details. Then,
in 2023, their main goal was to collect information across all Ukrainian
sectors.


19% RISE OF CYBER-ATTACKS TARGETING UKRAINE

The SSSCIP report also showed that overall registered cyber incidents amounted
to 1739 in the first half of 2024, a 19% rise compared to the previous reported
period.

However, this increase is mainly due to a boom in low - and medium-severity
incidents, while high- and critical-severity incidents decreased.

Finally, the report found that cyber adversaries targeting Ukraine have
increased their reliance on malware to conduct their campaigns, with 196
infections, including malicious software in the first half of 2024 from 103
during the previous period.

This trend is mainly due to an increased use of pirated software pre-packaged
with backdoors.

“We must also emphasize that providing licensed software such as Windows,
Office, EDR, MDM, SIEM, and IDM is critically important for both Ukrainian
military and civilian organizations to avoid vulnerabilities arising from
malware infections through unlicensed software,” the report concluded.

The report was based on data collected by CERT-UA, SOC-SSCIP, and other SSSCIP
cyber divisions.




YOU MAY ALSO LIKE


 1. RUSSIA'S SANDWORM UPGRADED TO APT44 BY GOOGLE'S MANDIANT
    
    News18 Apr 2024


 2. RUSSIAN APT SANDWORM DISRUPTED POWER IN UKRAINE USING NOVEL OT TECHNIQUES
    
    News9 Nov 2023


 3. MANDIANT UNVEILS RUSSIAN GRU'S CYBER PLAYBOOK AGAINST UKRAINE
    
    News13 Jul 2023


 4. RUSSIA'S CYBER TACTICS IN UKRAINE SHIFT TO FOCUS ON ESPIONAGE
    
    News7 Mar 2023


 5. RUSSIA: CYBER-ATTACKS COULD ESCALATE MILITARY CONFLICT
    
    News10 Jun 2022


WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice


GOING FOR GOLD: HSBC APPROVES QUANTUM-SAFE TECHNOLOGY FOR TOKENIZED BULLIONS

News20 Sep 2024
1


NIST FORMALIZES WORLD'S FIRST POST-QUANTUM CRYPTOGRAPHY STANDARDS

News13 Aug 2024
2


US CYBERSPACE SOLARIUM COMMISSION OUTLINES TEN NEW CYBER POLICY PRIORITIES

News20 Sep 2024
3


CYBERSECURITY SKILLS GAP LEAVES CLOUD ENVIRONMENTS VULNERABLE

News20 Sep 2024
4


GOOGLE STREET VIEW IMAGES USED FOR EXTORTION SCAMS

News18 Sep 2024
5


INFOSTEALERS CAUSE SURGE IN RANSOMWARE ATTACKS, JUST ONE IN THREE RECOVER DATA

News19 Sep 2024
6



NIST FORMALIZES WORLD'S FIRST POST-QUANTUM CRYPTOGRAPHY STANDARDS

News13 Aug 2024
1


GOING FOR GOLD: HSBC APPROVES QUANTUM-SAFE TECHNOLOGY FOR TOKENIZED BULLIONS

News20 Sep 2024
2


HALF OF UK FIRMS LACK BASIC CYBERSECURITY SKILLS

News16 Sep 2024
3


OVER HALF OF BREACHED UK FIRMS PAY RANSOM

News17 Sep 2024
4


ADVANCED PHISHING ATTACKS PUT X ACCOUNTS AT RISK

News16 Sep 2024
5


UK HOSTS INTERNATIONAL CYBER SKILLS CONFERENCE

News16 Sep 2024
6



LEARN KEY STRATEGIES FOR INDUSTRIAL DATA SECURITY

Webinar27 Jun 2024
1


SECURING APIS IN THE CLOUD FRONTIER

Webinar20 Mar 2024
2


BOUNCING BACK: BUILDING ORGANIZATIONAL RESILIENCE IN THE FACE OF CYBER-ATTACK

Webinar20 Mar 2024
3


PHISHING, IMPERSONATION, AND BEYOND: CISO INSIGHTS ON 2023-2024 EXTERNAL THREATS

Webinar15 Feb 2024
4


DISINFORMATION DEFENSE: PROTECTING BUSINESSES FROM THE NEW WAVE OF AI-POWERED
CYBER THREATS

Webinar20 Mar 2024
5


UNTANGLING THE WEB: NAVIGATING THIRD-PARTY RISK IN A HYPERCONNECTED WORLD

Webinar19 Mar 2024
6



INFOSECURITY MAGAZINE AUTUMN ONLINE SUMMIT 2024: DAY ONE

Online Summit09:45 – 15:00 BST, 10 Sep 2024
1


INFOSECURITY MAGAZINE AUTUMN ONLINE SUMMIT 2024: DAY TWO

Online Summit10:00 – 15:00 EDT, 11 Sep 2024
2


CLARK COUNTY CIO SHARES INSIGHTS ON SECURING AI INNOVATION AND BROADBAND
INITIATIVES

Interview19 Aug 2024
3


FROM PROTESTS TO PROFIT: WHY HACKTIVISTS ARE JOINING THE RANSOMWARE RANKS

News Feature28 Aug 2024
4


IRANIAN HACKERS SECRETLY AID RANSOMWARE ATTACKS ON US

News29 Aug 2024
5


POST-COMPROMISE SECURITY: WHAT TO DO WHEN THE HACKERS GET IN

News Feature20 Aug 2024
6



THE MAGAZINE

 * About Infosecurity
 * Meet the team
 * Contact us


ADVERTISERS

 * Media pack


CONTRIBUTORS

 * Forward features
 * Op-ed
 * Next-gen submission

 * 
 * 
 * 

 * Copyright © 2024 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookies Settings
 * Cookie Policy
 * Sitemap




We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy
Accept All Cookies
Cookies Settings



COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

Confirm My Choices