Microsoft Details Cyberwar on Ukraine
WASHINGTON — As the war rages on, information and public trust in the government are two of Russia’s top targets in Ukraine, according to a new report from Microsoft.
“Collectively, the cyber and kinetic actions work to disrupt or degrade Ukrainian government and military functions to undermine the public’s trust in those institutions,” the report said.
Microsoft released this report about a “hybrid” war just over two months into the physical war started by Russia as the company is working with the Ukrainian government via secure communications channels to alert the government about these cyberattacks via malware. The company is releasing details about the attacks so “others in the security community can continue to identify and defend against this activity,” according to a statement.
The Russian government and other groups with ties to the country conducted about 40 known destructive cyberattacks on Ukraine and organizations within the country between February 23 and April 8, according to the report. The Ukrainian government was the most targeted, receiving 19 destructive attacks. IT services, energy and media companies were the other most highly targeted industries, according to the report.
And there’s likely more malware to be discovered, the report said.
“Microsoft has also observed that the threat actors are slightly modifying the malware to evade detection with each wave of deployment. Acknowledging that there is ongoing activity that we cannot see, we estimate there have been at least eight destructive malware families deployed on Ukrainian networks, including one tailored to industrial control systems,” the report said. “If threat actors can maintain the current pace of development and deployment, we anticipate more destructive malware will be discovered as the conflict continues.”
Between July 2020 and June 2021 Ukraine was the recipient of the second-most “nation state threat activity,” the report said. During that year, 46% of attacks were directed at the U.S. while Ukraine received 19%, above the United Kingdom, which was the third-most targeted country at 9%, according to the report. That same year Microsoft observed Russia ramping up its activity, the report said.
Since Ukraine has been under physical attack, Microsoft has observed some “computer network attacks immediately preceded a military attack, but those instances have been rare from our perspective.”
One specific instance listed in the report was the attack on Kyiv-based media. On February 1 a missile struck a TV tower and a media company in the city was “compromised.”
While it’s unclear if cyberattackers and the military are working in tandem, many of the attacks create “a chaotic information environment, but Microsoft is not able to evaluate their broader strategic impact,” the report said.
And while Ukraine is the main target right now, “Microsoft encourages all organizations that are directly or indirectly associated with the conflict in Ukraine to proactively protect themselves from the threats described in this report and actively monitor for similar actions in their environment,” the report said. “Any organization that may be faced with defending their systems in future conflicts can follow the same general guidance to improve their defense against malicious cyber activity during conflicts.”
Multi-factor authentication and identity detection tools are two of the most important ways individuals can protect their systems, because stolen credentials have been one of the main ways Russia is getting into systems, the report said.
Isolating information through programs such as Microsoft’s Attack Surface Reduction and Control Folder Access are also important for ensuring ransomware attacks are not as destructive, the report said. Those programs that isolate information within a system protect against the malware that will wipe out the information.
“We’ve observed Russian-aligned actors active in Ukraine show interest in or conduct operations against organizations in the Baltics and Turkey — all [North Atlantic Treaty Organization] member states actively providing political, humanitarian or military support to Ukraine,” the company said in a statement released with the report. “The alerts published by [the Cybersecurity and Infrastructure Security Agency] and other U.S. government agencies, and cyber-officials in other countries, should be taken seriously and the recommended defensive and resilience measures should be taken — especially by government agencies and critical infrastructure enterprises.”
In The News
WASHINGTON — House Majority Leader Steny Hoyer, D-Md., has long been an advocate for using technology to help Congress work... Read More
WASHINGTON — House Majority Leader Steny Hoyer, D-Md., has long been an advocate for using technology to help Congress work better and with more transparency for its members’ constituents. In 2015, for instance, it was Hoyer, with help from his staff, who released the Dome Watch... Read More
WASHINGTON — What does a threat sound like? In rainforests across the world it can sound like a chainsaw or... Read More
WASHINGTON — What does a threat sound like? In rainforests across the world it can sound like a chainsaw or a gunshot. Thanks to the nonprofit Rainforest Connection, recording devices around the world are listening for these sounds to alert environmentalists of potential illegal activities. Right... Read More
WASHINGTON — House Majority Leader Steny Hoyer, D-Md., on Thursday urged House and Senate conferees currently working on a bipartisan... Read More
WASHINGTON — House Majority Leader Steny Hoyer, D-Md., on Thursday urged House and Senate conferees currently working on a bipartisan innovation bill to complete their work soon so that the House can vote on it before the August recess. Originally called the Endless Frontier Act, the... Read More
WASHINGTON — The 2021 Infrastructure Investment and Jobs Act provided funding not only for roads, bridges, and efforts to curb... Read More
WASHINGTON — The 2021 Infrastructure Investment and Jobs Act provided funding not only for roads, bridges, and efforts to curb future pollution, but the bill also made money available for lesser-known innovative technology projects that speak to the harm humans have already done to the environment. ... Read More
WASHINGTON — Congress is trying to catch up to the computerized automation that is running many American businesses but only... Read More
WASHINGTON — Congress is trying to catch up to the computerized automation that is running many American businesses but only now is filtering into more conservative government offices. A House committee held a hearing Thursday to determine how to bring greater efficiencies into government operations through... Read More
WASHINGTON — Laughter rang out at the Brookings Institution when an audience question came to two White House staffers: “Was... Read More
WASHINGTON — Laughter rang out at the Brookings Institution when an audience question came to two White House staffers: “Was the internet a mistake?” The question came about a half hour into a discussion about how the U.S. is inspiring a global effort to reignite the... Read More