Daily Tech News, Interviews, Reviews and Updates

Cyberattacks increased on Ukraine by the Russian side

Ukraine’s parliament, as well as other government and banking websites, were targeted by another wave of distributed-denial-of-service attacks on Wednesday, according to cybersecurity researchers, who also claimed that unidentified attackers infected hundreds of computers with destructive malware.

Officials have long predicted that cyber-attacks will precede and accompany any Russian military incursion, and analysts say the incidents follow a nearly two-decade-old Russian playbook of combining cyber operations with real-world aggression.

ESET Research Labs reported Wednesday that it discovered a new data-wiping piece of malware in Ukraine on “hundreds of machines throughout the country.” However, it was unclear how many networks were affected.

“With regard to whether the malware was successful in its wiping capability, we assume that this was the case and affected machines were wiped,” ESET research chief Jean-Ian Boutin told The Associated Press in response to questions.

Boutin refused to name the targets “to protect the victims,” but he did say that “these were large organisations that were affected,” and that while ESET cannot say who was responsible, “the attack appears to be related to the ongoing crisis in Ukraine.”

According to Vikram Thakur, technical director at Symantec Threat Intelligence, the wiper malware infected three organisations: Ukrainian government contractors in Latvia and Lithuania, as well as a Ukrainian financial institution.

Cyberattacks have been a key tool of Russian aggression in Ukraine since before 2014, when the Kremlin annexed Crimea. Distributed-denial-of-service attacks are among the least impactful because they don’t entail network intrusion. Such attacks barrage websites with junk traffic so they become unreachable. They were also used against Estonia in 2007 and Georgia in 2008.

When asked about the ESET discovery, senior Ukrainian cyber defence official Victor Zhora said, “No comments.” Boutin said the malware’s timestamp indicates it was created in late December and that it has only been seen in Ukraine.C

Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More