{"id":18376,"date":"2022-02-25T15:10:07","date_gmt":"2022-02-25T23:10:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/25\/news-12109\/"},"modified":"2022-02-25T15:10:07","modified_gmt":"2022-02-25T23:10:07","slug":"news-12109","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/25\/news-12109\/","title":{"rendered":"Potential cybersecurity impacts of Russia&#8217;s invasion of Ukraine"},"content":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Fri, 25 Feb 2022 22:13:21 +0000<\/strong><\/p>\n<p>On Thursday night, Russia launched a military invasion of its neighbor and former Soviet Union member Ukraine, drawing a broad rebuke from international leaders, along with significant protest from the Russian public.<\/p>\n<p>The toll of human life from this war is unknown, and, like the many international acts of aggression that have preceded it, future figures and statistics will not, alone, make sense of it. The threats and dangers posed by this conflict will be borne by the combatants and the people of Ukraine, and they are in our thoughts. Our collective priority must be people\u2019s physical safety, but Russia\u2019s assault could also produce a range of cybersecurity-related risks that organizations and people will need to protect themselves against, starting today.<\/p>\n<p>Here are some of the ways in which Russia\u2019s invasion of Ukraine may impact cybersecurity, and what organizations can do to stay safe in a continually evolving crisis.<\/p>\n<h3><strong>The risk of increased stakes<\/strong><\/h3>\n<p>In tandem with the physical strikes against Ukraine, a piece of wiper malware first detected by researchers at Symantec and ESET had already begun targeting organizations in Ukraine. <a href=\"https:\/\/www.sentinelone.com\/labs\/hermetic-wiper-ukraine-under-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Analyzed by SentinelOne<\/a>, this wiper malware has been given the name HermeticWiper and it differentiates itself from typical malware in one, important way: Those responsible for it aren\u2019t looking for any payment\u2014they just want to do damage.<\/p>\n<p>Current analyses of HermeticWiper reveal that the malware is being delivered in highly-targeted attacks in Ukraine, Latvia, and Lithuania. Its operators seem to leverage vulnerabilities in external-facing servers while utilizing compromised account credentials to gain access and spread the malware further.<\/p>\n<p>These tactics are nothing new, and familiar cybersecurity best practices around privileged access hold true. But here, the stakes have changed. Even in the worst-case-scenario of any ransomware attack, there\u2019s at least a promise (which could admittedly be false) of a decryption key that can be purchased for a price. With a wiper malware, there is no such opportunity.<\/p>\n<p>As described by Brian Krebs <a href=\"https:\/\/krebsonsecurity.com\/2022\/02\/russia-sanctions-may-spark-escalating-cyber-conflict\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">on his blog<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cHaving your organization\u2019s computers and servers locked by ransomware may seem like a day at the park compared to getting hit with \u2018wiper\u2019 malware that simply overwrites or corrupts data on infected systems.\u201d<\/p>\n<\/blockquote>\n<h3><strong>The risk of collateral damage<\/strong><\/h3>\n<p>Russia\u2019s proclivity for cyber warfare is well recorded. In the past, the country has been credibly blamed or proven responsible for <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/22\/cyberthreats-during-russian-ukrainian-tensions-what-can-we-learn-from-history-to-be-prepared\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">several cyberattacks against Ukraine<\/a> and its surrounding neighbors, including DDoS attacks in Estonia in 2007, Georgia in 2008, and Kyrgyzstan in 2009. Russia is also believed to have been responsible for an email spam campaign against Georgia in 2008, and also for the delivery of the <a href=\"https:\/\/www.nytimes.com\/2014\/03\/09\/world\/europe\/suspicion-falls-on-russia-as-snake-cyberattacks-target-ukraines-government.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u201cSnake\u201d malware against Ukraine\u2019s government in 2014<\/a>. And in 2015 and 2017, when Ukraine\u2019s power grid suffered two separate shutdowns because of the malware variants BlackEnergy and Industroyer\/CrashOverride, much of the evidence reportedly pointed back to Russia.<\/p>\n<p>Though these attacks, like the current attacks involving HermeticWiper, were highly targeted, the idea of \u201ctidy\u201d cyber warfare is a farce.<\/p>\n<p>In June 2017, Russia\u2014<a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/russian-military-was-behind-notpetya-cyberattack-in-ukraine-cia-concludes\/2018\/01\/12\/048d8506-f7ca-11e7-b34a-b85626af34ef_story.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">as concluded by the CIA just months later<\/a>\u2014unleashed a cyberattack on Ukraine that spilled out into the world. The cyberattack involved a piece of malware reportedly developed by Russia\u2019s military intelligence agency the GRU, called NotPetya. Though it presented itself as a common piece of ransomware, it actually worked more like a wiper, destroying the data of its victims, which included banks, energy firms, and government officials.<\/p>\n<p>But the attack, which was reportedly carried out to harm Ukraine\u2019s financial system, spread out, hitting networks in Denmark, India, and the United States.<\/p>\n<p>It was at the time the most devastating cyberattack in history, costing the shipping company Maersk a reported $300 million, and the pharmaceutical giant Merck a reported $870 million.<\/p>\n<p>Though it&#8217;s impossible to predict what type of collateral damage could occur, the US Cybersecurity and Infrastructure Security Agency has released a cybersecurity guide for all organizations in the US to follow during this turbulent time. <a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">You can read that guide, called Shields Up, here<\/a>. <\/p>\n<h3><strong>The risk of escalation<\/strong><\/h3>\n<p>As Ukraine defends itself against Russian forces, world leaders are faced with a difficult decision. Should they deliver support to Ukraine in any material way, Russia may then retaliate against them with its own cyber-attacks,\u00a0and these attacks are unlikely to be borne by world leaders. Instead, the \u201ccrossfire\u201d between national cyber-fronts will likely inflict harm on everyday individuals and businesses.<\/p>\n<p>Already, this decision has produced a wrinkle, as world leaders are not just defending themselves against Russia\u2019s cyber-offensive regimes, but also against known ransomware gangs that have quickly sworn allegiance to Russia\u2019s cause.<\/p>\n<p>On February 25, the Conti ransomware group announced that it would retaliate against any known physical or cyberattacks against Russia. <a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/02\/cyber-lures-and-threats-in-the-context-of-the-war-in-ukraine\/\">As we wrote on Malwarebytes Labs<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cAny doubt that some of the world&#8217;s most damaging ransomware groups were aligned with the Kremlin, this sort of allegiance will put an end to it.\u201d<\/p>\n<\/blockquote>\n<p>Despite a clarification about an hour later, which attempted to reframe the group&#8217;s &#8220;full support of Russian government&#8221; into &#8220;we do not ally with any government&#8221;, there can be no doubt about <a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2021\/05\/threat-spotlight-conti-the-ransomware-used-in-the-hse-healthcare-attack\/\">the threat the group poses<\/a>.<\/p>\n<p>Unfortunately, the risk of escalation seems likely, as countries ramp up economic sanctions against Russia, and as the US is walking a delicate balance about its own cyber initiatives. On February 24, multiple White House officials denied, as NBC News had earlier reported, that the Biden Administration was considering multiple \u201coptions\u201d of cyber engagement \u201con a scale never before contemplated.\u201d<\/p>\n<p>According to White House Press Secretary Jen Psaki, who wrote on Twitter, NBC\u2019s \u201creport on cyber options being presented to <a href=\"https:\/\/twitter.com\/POTUS\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">@POTUS<\/a> is off base and does not reflect what is actually being discussed in any shape or form.\u201d<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">This report on cyber options being presented to <a href=\"https:\/\/twitter.com\/POTUS?ref_src=twsrc%5Etfw\">@POTUS<\/a> is off base and does not reflect what is actually being discussed in any shape or form.<\/p>\n<p>&mdash; Jen Psaki (@PressSec) <a href=\"https:\/\/twitter.com\/PressSec\/status\/1496919281535111211?ref_src=twsrc%5Etfw\">February 24, 2022<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>These denials, however, preceded a more recent statement made by President Joe Biden this week, in which he said that \u201cIf Russia pursues cyberattacks against our companies, our critical infrastructure, we&#8217;re prepared to respond. For months, we&#8217;ve been working closely with the private sector to harden our cyber defenses [and] sharpen our response to Russian cyberattacks.\u201d<\/p>\n<h3><strong>The risk of misinformation<\/strong><\/h3>\n<p>Already, countless videos have begun circulating online that either make unproven claims or make claims that have specifically been debunked. Earlier today, a video that purports to show a Ukrainian fighter pilot shooting down Russian air forces in the sky was <a href=\"https:\/\/www.snopes.com\/fact-check\/is-this-ghost-of-kyiv-video-real\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">proven to be fake<\/a>\u2014a product of a simulation game called Digital Combat Simulator.<\/p>\n<p>Though that video was developed as an \u201chomage\u201d to the so-called \u201cGhost of Kyiv,\u201d social media companies have been combatting a Kremlin-backed disinformation campaign taking place on Twitter, Facebook, YouTube, and TikTok.<\/p>\n<p>According to <a href=\"https:\/\/www.politico.com\/news\/2022\/02\/24\/social-media-platforms-russia-ukraine-disinformation-00011559\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">recent reporting from Politico<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;Russia-backed media reports falsely claiming that\u00a0the Ukrainian government is conducting genocide\u00a0of civilians ran unchecked and unchallenged\u00a0on Twitter\u00a0and on Facebook. Videos from the Russian government \u2014 including speeches from Vladimir Putin \u2014\u00a0on YouTube\u00a0received dollars from\u00a0Western advertisers. Unverified TikTok videos of\u00a0alleged real-time battles\u00a0were instead historical footage, including doctored conflict-zone images and sounds.\u201d<\/p>\n<\/blockquote>\n<p>Users should digest any viral videos and news with caution, particularly during this conflict, as the primary aggressor has a <a href=\"https:\/\/penntoday.upenn.edu\/news\/russias-disinformation-campaign-against-us\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">proven history with information warfare<\/a>. It is also worth remembering that during wartime even reporting from reputable sources may be based on innaccurate, incomplete or out-of-date information.<\/p>\n<h3><strong>The risk of scams<\/strong><\/h3>\n<p>In 2020, as infections of COVID-19 dramatically increased to the point of officially creating a global pandemic, <a href=\"https:\/\/blog.malwarebytes.com\/scams\/2020\/03\/coronavirus-scams-found-and-explained\/\">online scammers pounced<\/a>, sending bogus emails asking for donations to fake charities and registering thousands of COVID-19-related domains to trick unwitting victims into swiping their money or their account credentials.<\/p>\n<p>With Russia\u2019s invasion of Ukraine, the same strategy will likely happen, as online scammers constantly seek the latest crisis to leverage for an attack.<\/p>\n<p>When asked on Twitter for advice on which organizations to donate to in order to help Ukraine, the user @RegGBlinker said that, after she\u2019d read through a list of such organizations, <a href=\"https:\/\/twitter.com\/RegGBlinker\/status\/1497103362382254080\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">she found many that raised suspicions.<\/a><\/p>\n<p>The same Twitter user has already compiled a thread that links to multiple other Twitter users who have personally offered their cybersecurity help to small-to-medium-sized businesses (SMBs) affected by the attacks in Ukraine.<\/p>\n<p>At the same time, several companies and organizations have begun offering their own support. F-Secure, for example, <a href=\"https:\/\/twitter.com\/FSecure\/status\/1497248407303462960\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">is offering its VPN tool for free to anyone in Ukraine<\/a>, and The Tor Project has <a href=\"https:\/\/twitter.com\/torproject\/status\/1497276967846039563\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">released a support channel for Russian-speaking users<\/a> who want help in setting up Tor.<\/p>\n<p><a href=\"https:\/\/twitter.com\/RegGBlinker\/status\/1496926293962928128\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The full thread on support can be found here<\/a>. <\/p>\n<p>For any other donation offers that users think might be a scam, trust the same rules that apply to phishing emails\u2014are there any misspellings, grammar mistakes, unknown senders, or unknown charities involved in the request? Check yourself before handing over any money. <\/p>\n<h3><strong>The risk of focusing too heavily on Ukraine<\/strong><\/h3>\n<p>While Ukraine is in crisis, several online threat actors have continued their own assault campaigns.<\/p>\n<p>On February 24, multiple outlets reported that a ransomware gang that the cybersecurity firm Mandiant tracks as \u201cUNC2596\u201d was exploiting vulnerabilities in Microsoft Exchange to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-exchange-servers-hacked-to-deploy-cuba-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">deliver its preferred ransomware, colloquially dubbed \u201cCuba.\u201d<\/a> On the same day, the US Cybersecurity and Infrastructure Security Agency (CISA) announced that it had spotted \u201cmalicious cyber operations by Iranian government-sponsored advanced persistent threat (APT) actors known as MuddyWater.\u201d Those attacks were <a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/02\/cisa-warns-of-cyberespionage-by-iranian-apt-muddywater\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">targeting both government and private-sector organizations in Asia, Africa, Europe, and North America<\/a>.<\/p>\n<p>An international human crisis is in no way a cause for inaction from online threat actors. Organizations should follow the same guidance they have before in protecting themselves from the most common online threats.<\/p>\n<p>As CISA Director Jen Easterly <a href=\"https:\/\/twitter.com\/CISAJen\/status\/1496894349803769860\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warned on Twitter<\/a>:<\/p>\n<p>\u201cEven as we remain laser-focused on Russian malicious cyber activity, we cannot fail to see around the corners.\u201d<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/potential-cybersecurity-impacts-of-russias-invasion-of-ukraine\/\">Potential cybersecurity impacts of Russia&#8217;s invasion of Ukraine<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/potential-cybersecurity-impacts-of-russias-invasion-of-ukraine\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Fri, 25 Feb 2022 22:13:21 +0000<\/strong><\/p>\n<p>Responding to the crisis in Ukraine must prioritize physical safety, but there are related cyber-risks to consider too.  <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/potential-cybersecurity-impacts-of-russias-invasion-of-ukraine\/\">Potential cybersecurity impacts of Russia&#8217;s invasion of Ukraine<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20429,23583,25141,25142,24444,25143,20430,9467,25144,25145,19872,25146,25147,25148,10546,12830,16078,25149,3765,251,12180,25150,8642,16068],"class_list":["post-18376","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-blackenergy","tag-cisa","tag-conti","tag-conti-ransomware","tag-covid-19","tag-covid-19-scams","tag-crashoverride","tag-georgia","tag-ghost-of-kyiv","tag-hermeticwiper","tag-industroyer","tag-kyrgyzstan","tag-latvia","tag-lithuania","tag-malwarebytes-news","tag-notpetya","tag-notpetya-ransomware","tag-ransom-conti","tag-ransomware","tag-russia","tag-snake","tag-snake-ransomware","tag-ukraine","tag-wiper"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18376"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18376\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}