The coordinated cyberattacks focusing on Ukrainian authorities internet sites and the deployment of a knowledge-wiper malware termed WhisperGate on choose authorities systems are aspect of a broader wave of destructive activities aimed at sabotaging critical infrastructure in the nation.
The Secret Service of Ukraine on Monday confirmed that the two incidents are relevant, introducing the breaches also exploited the just lately disclosed Log4j vulnerabilities to gain obtain to some of the compromised techniques.
“The attack utilized vulnerabilities in the site’s content material management methods (October CMS) and Log4j, as properly as compromised accounts of employees of the progress firm,” the SSU mentioned, corroborating prior disclosure from the Ukraine CERT crew.
“The attackers corrupted MBR data (the services facts on the media needed to obtain the details) on personal servers and person computers. Furthermore, this applies to both operating methods operating Windows and Linux.”
The Ukrainian Cyber Law enforcement, for its aspect, pointed out that it really is investigating a mixture of 3 intrusion vectors that had been probably employed to pull off the attacks — offer chain attack targeting an IT company which manages web sites for the Ukrainian govt, exploitation of the flaw in October CMS, and Log4j vulnerabilities.
What is a lot more, the IT organization referenced by Microsoft, Kitsoft, verified on Facebook it experienced been strike with the WhisperGate malware. “The existing circumstance is not just about hacking internet sites, it is an attack aimed at sowing stress and anxiety, destabilizing the place from inside,” the firm explained.
While neither the Cyber Law enforcement nor the SSU attributed the defacements and the harmful malware attacks to any risk team or point out-sponsored actor, the Ukrainian Ministry of Digital Transformation pointed fingers at Russia, accusing the state of making an attempt to “wage a hybrid war.”
Observed this post intriguing? Abide by THN on Facebook, Twitter and LinkedIn to examine additional special content material we post.
Some sections of this short article are sourced from: