Ukraine invasion: This may be the quiet before the cyber-storm, IT staff warned

Now is the time to be a prepper – the computer security kind

Updated As the invasion of Ukraine heads into its third week with NATO allies ratcheting up sanctions against Russia, infosec vendors have urged Western governments and businesses to prepare for retaliatory cyberattacks.

According to Mandiant, Ukraine remains the top target for destructive or disruptive cyberattacks. That said, several US and EU sectors including government, financial services, energy and utilities, and transportation face a "moderate-high" risk of attack from Kremlin-backed miscreants. Media outlets, meanwhile, face a "moderate" risk. 

So far, apart from a few standout moments – such as web systems being knocked over, wiper malware infecting machines, and satellite communication terminals coming under attack – there's been little indication of a serious, widespread escalation in cyberwarfare between Russia and Ukraine and its allies.

"The nature and length of NATO and Western sanctions and responses likely will heavily influence Russia's perception of high-priority targets for retaliation," warned Mandiant, which sells cyber-defense products and services.

"Organizations making public statements condemning Russian aggression and/or supporting Ukraine and organizations taking actions to restrict Russian participation in international commerce, competitions, and events face elevated risk of future reprisal."  

This warning comes as a slew of tech companies have pledged to drastically scale back sales in Russia and Belarus, if not quit both countries altogether. Others, including Cloudflare and Akamai, have said they'll keep their networks up and running in Russia to provide its citizens with connectivity to the rest of the world — but they've also said they stand with Ukraine.

At the very least, as we've previously reported, Western governments and organizations should prepare for Russian cyber-espionage, according to soon-to-be-Google-owned Mandiant. However, threat actors like Sandworm and the Conti ransomware gang may also "conduct additional destructive or disruptive cyber attacks," it warned.

More wiper attacks likely

Palo Alto Networks' Unit 42 threat intelligence team also expects Russian-backed cyberattacks to spread beyond Ukraine. 

"We think the most likely attack that an organization is going to see is a defacement or other wiper-type attack," said Ryan Olson, VP of Unit 42 threat intelligence, during a briefing this week. "That doesn't mean there couldn't be another type of intrusion, but our recommendation is to prepare for some sort of data disruption."

Unit 42 and others documented escalating cyber-activity in Ukraine, including a series of DDoS attacks against government agencies and banks plus a new file-destroying software nasty named HermeticWiper. This malware targets Windows machines and allows its operators to erase all data from a victim's systems. After HermeticWiper spread, another round of website defacement attacks against Ukrainian government organizations soon followed.

Western governments and businesses "should be prepared for the types of attacks that we have been seeing" in Ukraine, Olson said. "Not the same malware, not the same infrastructure that was used inside of Ukraine, but the same kind of tactics."

How to prepare

And the first thing organizations should do to prepare themselves is to lock down their networks, he added. 

For example, Russian-backed groups used two popular messaging platforms Discord and Trello to distribute malicious files on Ukrainian devices.

"If you're not using an application like Discord for legitimate purposes inside your network, disabling access to it only provides you a security benefit," Olson said. "Even if you're not using it legitimately, even if you don't have a business use case, if it's allowed in the network, an attacker could still abuse it to deliver some malware."

Where are the serious Russian cyberattacks?


Organizations should also stay up-to-date with patches for their internet-facing and business-critical software, Olson added. Because, per usual, preparing for any potential attack usually comes down to basic security hygiene and version management.

When it comes to preparing more specifically for a ransomware or wiper attack, companies should develop a business continuity plan. "Plan for if your systems are shut down, and getting the business stakeholders involved so that they know what the impact could be if one of their critical databases or other systems is shut down," Olson said. 

Especially in the case of data-wiping malware, "you're going to need to recover, and you won't have the ability to just pay some bitcoin to get your files back," he said.

Finally, be prepared to respond quickly to an attack. "Time is always of the essence, especially when you have a threat actor who's trying to have a broad impact against organizations, against critical infrastructure," Olson said. "The sooner you're able to isolate hosts and take action, the better."

Perform tabletop exercises, run through playbooks and communication plans, and have an incident response team waiting in the wings, he added.

That is to say, though it appears to be relatively quiet at the moment on the cybersecurity front, it's probably best to have a plan in place than lapse into complacency and cynicism. ®

Updated to add

"Atlassian has already deployed detections to identify these malicious campaigns, which has allowed us to immediately suspend suspicious Trello boards and accounts. Our security team continues to monitor for any signs of further abuse," an Atlassian spokesperson told The Register.

"It should be noted that most apps on the internet that allow users to share text or files (including email, WhatsApp and Twitter) can be misused to spread malicious links and attachments. The campaigns were not enabled by Trello product vulnerabilities, and Trello user data has not been compromised."

Narrower topics

Other stories you might like

  • Quantum internet within grasp as scientists show off entanglement demo
    Teleportation of quantum information key to future secure data transfer

    Researchers in the Netherlands have shown they can transmit quantum information via an intermediary node, a feature necessary to make the so-called quantum internet possible.

    In recent years, scientists have argued that the quantum internet presents a more desirable network for transferring secure data, in addition to being necessary when connecting multiple quantum systems. All of this has been attracting investment from the US government, among others.

    Despite the promise, there are still vital elements missing for the creation of a functional quantum internet.

    Continue reading
  • Drone ship carrying yet more drones launches in China
    Zhuhai Cloud will carry 50 flying and diving machines it can control with minimal human assistance

    Chinese academics have christened an ocean research vessel that has a twist: it will sail the seas with a complement of aerial and ocean-going drones and no human crew.

    The Zhu Hai Yun, or Zhuhai Cloud, launched in Guangzhou after a year of construction. The 290-foot-long mothership can hit a top speed of 18 knots (about 20 miles per hour) and will carry 50 flying, surface, and submersible drones that launch and self-recover autonomously. 

    According to this blurb from the shipbuilder behind its construction, the Cloud will also be equipped with a variety of additional observational instruments "which can be deployed in batches in the target sea area, and carry out task-oriented adaptive networking to achieve three-dimensional view of specific targets." Most of the ship is an open deck where flying drones can land and be stored. The ship is also equipped with launch and recovery equipment for its aquatic craft. 

    Continue reading
  • Experts: AI should be recognized as inventors in patent law
    Plus: Police release deepfake of murdered teen in cold case, and more

    In-brief Governments around the world should pass intellectual property laws that grant rights to AI systems, two academics at the University of New South Wales in Australia argued.

    Alexandra George, and Toby Walsh, professors of law and AI, respectively, believe failing to recognize machines as inventors could have long-lasting impacts on economies and societies. 

    "If courts and governments decide that AI-made inventions cannot be patented, the implications could be huge," they wrote in a comment article published in Nature. "Funders and businesses would be less incentivized to pursue useful research using AI inventors when a return on their investment could be limited. Society could miss out on the development of worthwhile and life-saving inventions."

    Continue reading
  • SEC probes Musk for not properly disclosing Twitter stake
    Meanwhile, social network's board rejects resignation of one its directors

    America's financial watchdog is investigating whether Elon Musk adequately disclosed his purchase of Twitter shares last month, just as his bid to take over the social media company hangs in the balance. 

    A letter [PDF] from the SEC addressed to the tech billionaire said he "[did] not appear" to have filed the proper form detailing his 9.2 percent stake in Twitter "required 10 days from the date of acquisition," and asked him to provide more information. Musk's shares made him one of Twitter's largest shareholders. The letter is dated April 4, and was shared this week by the regulator.

    Musk quickly moved to try and buy the whole company outright in a deal initially worth over $44 billion. Musk sold a chunk of his shares in Tesla worth $8.4 billion and bagged another $7.14 billion from investors to help finance the $21 billion he promised to put forward for the deal. The remaining $25.5 billion bill was secured via debt financing by Morgan Stanley, Bank of America, Barclays, and others. But the takeover is not going smoothly.

    Continue reading
  • Cloud security unicorn cuts 20% of staff after raising $1.3b
    Time to play blame bingo: Markets? Profits? Too much growth? Russia? Space aliens?

    Cloud security company Lacework has laid off 20 percent of its employees, just months after two record-breaking funding rounds pushed its valuation to $8.3 billion.

    A spokesperson wouldn't confirm the total number of employees affected, though told The Register that the "widely speculated number on Twitter is a significant overestimate."

    The company, as of March, counted more than 1,000 employees, which would push the jobs lost above 200. And the widely reported number on Twitter is about 300 employees. The biz, based in Silicon Valley, was founded in 2015.

    Continue reading
  • Talos names eight deadly sins in widely used industrial software
    Entire swaths of gear relies on vulnerability-laden Open Automation Software (OAS)

    A researcher at Cisco's Talos threat intelligence team found eight vulnerabilities in the Open Automation Software (OAS) platform that, if exploited, could enable a bad actor to access a device and run code on a targeted system.

    The OAS platform is widely used by a range of industrial enterprises, essentially facilitating the transfer of data within an IT environment between hardware and software and playing a central role in organizations' industrial Internet of Things (IIoT) efforts. It touches a range of devices, including PLCs and OPCs and IoT devices, as well as custom applications and APIs, databases and edge systems.

    Companies like Volvo, General Dynamics, JBT Aerotech and wind-turbine maker AES are among the users of the OAS platform.

    Continue reading
  • Despite global uncertainty, $500m hit doesn't rattle Nvidia execs
    CEO acknowledges impact of war, pandemic but says fundamentals ‘are really good’

    Nvidia is expecting a $500 million hit to its global datacenter and consumer business in the second quarter due to COVID lockdowns in China and Russia's invasion of Ukraine. Despite those and other macroeconomic concerns, executives are still optimistic about future prospects.

    "The full impact and duration of the war in Ukraine and COVID lockdowns in China is difficult to predict. However, the impact of our technology and our market opportunities remain unchanged," said Jensen Huang, Nvidia's CEO and co-founder, during the company's first-quarter earnings call.

    Those two statements might sound a little contradictory, including to some investors, particularly following the stock selloff yesterday after concerns over Russia and China prompted Nvidia to issue lower-than-expected guidance for second-quarter revenue.

    Continue reading
  • Another AI supercomputer from HPE: Champollion lands in France
    That's the second in a week following similar system in Munich also aimed at researchers

    HPE is lifting the lid on a new AI supercomputer – the second this week – aimed at building and training larger machine learning models to underpin research.

    Based at HPE's Center of Excellence in Grenoble, France, the new supercomputer is to be named Champollion after the French scholar who made advances in deciphering Egyptian hieroglyphs in the 19th century. It was built in partnership with Nvidia using AMD-based Apollo computer nodes fitted with Nvidia's A100 GPUs.

    Champollion brings together HPC and purpose-built AI technologies to train machine learning models at scale and unlock results faster, HPE said. HPE already provides HPC and AI resources from its Grenoble facilities for customers, and the broader research community to access, and said it plans to provide access to Champollion for scientists and engineers globally to accelerate testing of their AI models and research.

    Continue reading

Biting the hand that feeds IT © 1998–2022