• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft: Russia Has Launched Hundreds of Cyber Operations in Ukraine

You are here: Home / General Cyber Security News / Microsoft: Russia Has Launched Hundreds of Cyber Operations in Ukraine
April 28, 2022

Russian state-aligned actors have released 237 campaigns from Ukrainian targets since just ahead of the invasion, according to new threat intelligence shared by Microsoft.

The tech giant has been checking and sharing updates on the problem to inform policymakers, the world wide populace and the security local community about the scale and variety of attacks staying released by the Kremlin.

“Starting just before the invasion, we have viewed at least six independent Russia-aligned country-condition actors launch far more than 237 functions versus Ukraine – which includes damaging attacks that are ongoing and threaten civilian welfare. The damaging attacks have also been accompanied by wide espionage and intelligence activities,” discussed Microsoft VP of shopper security and trust, Tom Burt.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“The attacks have not only degraded the devices of institutions in Ukraine but have also sought to disrupt people’s obtain to reliable facts and critical life solutions on which civilians rely, and have tried to shake self esteem in the country’s leadership. We have also noticed limited espionage attack action involving other NATO member states, and some disinformation activity.”

The cyber-attacks are often timed to coincide with authentic-entire world kinetic armed forces functions, he continued.

For case in point, cyber-attacks were introduced in opposition to a significant Ukrainian broadcaster on March 1, the identical day as a missile strike on a Tv tower in Kyiv.

Almost 40 harmful attacks have been aimed at hundreds of targets, a third (32%) of which ended up Ukrainian governing administration companies and two-fifths (40%) of which ended up critical infrastructure belongings in the region.

“Actors engaging in these attacks are utilizing a range of tactics to obtain original entry to their targets such as phishing, use of unpatched vulnerabilities and compromising upstream IT company providers,” stated Burt.

“These actors normally modify their malware with each deployment to evade detection. Notably, our report characteristics wiper malware attacks we earlier disclosed to a Russian nation-point out actor we contact Iridium.”

Apparently, pre-positioning for these attacks seems to have begun as far back as March 2021.

“When Russian troops first commenced to go toward the border with Ukraine, we observed endeavours to gain first entry to targets that could offer intelligence on Ukraine’s army and international partnerships. By mid-2021, Russian actors were concentrating on provide chain suppliers in Ukraine and overseas to secure even further access not only to systems in Ukraine but also NATO member states,” said Burt.

“In early 2022, when diplomatic endeavours failed to de-escalate mounting tensions about Russia’s armed service construct-up together Ukraine’s borders, Russian actors launched destructive wiper malware attacks from Ukrainian companies with increasing depth.”

Sadly for Ukraine, Burt claimed that cyber-attacks would keep on to escalate, with damaging raids likely even qualified exterior the region. However, Microsoft admitted that it is likely observing only a “fraction” of the attacks hitting Ukrainian assets. The complete report is available here.


Some areas of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Security Alert as Researchers Discover 400,000 Exposed Databases
Next Post: Global Security Spending Set to Hit $198bn by 2025 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.