or NATO response to a potential Russian invasion of Ukraine “threatened long-term national security.” February 14: Critical infrastructure in Odesa compromised Department of Homeland Security (DHS) sent an intelligence bulletin to critical infrastructure operators and state and local governments warning that Russia would consider conducting a cyberattack on the U.S. January 23: DHS issues bulletin for critical infrastructure operators ![]() The announcement was made even as the attacks on the Ukraine websites were underway. In what seemingly appeared to be a surprise demonstration of U.S.-Russian collaboration, Russia’s FSB domestic intelligence service said that it dismantled ransomware crime group REvil at the request of the United States in an operation that resulted in the arrest of the group’s members. January 14: Russia takes down REvil ransomware group The European Union condemned the attacks and said it stands “ready to provide additional, direct, technical assistance to Ukraine to remediate this attack and further support Ukraine against any destabilizing actions, including by further building up its resilience against hybrid and cyber threats.” NATO Secretary-General Jens Stoltenberg said that his cyber experts in Brussels were exchanging information with their Ukrainian counterparts on the malicious cyber activities and would sign an agreement on enhanced cyber cooperation. Serhiy Demedyuk, deputy secretary of Ukraine’s national security and defense council, preliminarily pinned the attacks on a hacker group linked to Belarusian intelligence known as UNC1151. Ukraine’s State Bureau of Investigations (SBI) press service said that no data were stolen in the attack.Īlthough Ukraine did not attribute the attacks to Russia definitively, the European Union’s chief diplomat Josep Borrell hinted that Russia was the culprit. All data on your computer is destroyed and cannot be recovered,” and raised historical grievances between Poland and Ukraine. The message also warned Ukrainians, “All your personal data has been sent to a public network. Victor Zhora, the deputy head of Ukraine’s State Service of Special Communications and Information Protection (SSCIP), has already declared Russia to be the perpetrator of “cyber war crimes” and is calling for prosecutions in the International Criminal Court (ICC). Once the kinetic war against Ukraine ends, an accurate picture of cyber damage in Ukraine and surrounding areas will no doubt emerge. Since then, a spate of digital disruptions by Russia, and digital defenses by Ukraine and its allies, point to a steady drumbeat of mostly low-level but steady and robust cyber assaults. ![]() Despite the widespread fears of cyber war at the outset of the invasion, no highly damaging incidents such as crippling attacks on Ukraine’s power grid have yet occurred.Īs our updated timeline shows, however, the invasion did begin on February 24 with a disturbing assault on Ukraine’s communications capabilities via an attack on satellite provider Viasat, attributed to Russia’s GRU intelligence arm. It’s also the six-month anniversary of the official launch of Russia’s invasion into Ukraine, with no clear end to the aggression in sight.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |