• XRATOR
  • Our Experts
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Threat Intelligence

Modern war: keyboards and guns

History will remember when the first shot in the Ukraine-Russia conflict was a malware.

Ronan MouchouxbyRonan Mouchoux
June 24, 2022
in Cyber Attacks, Cyberdefense, Cybersecurity, Malware, News, Risk Management, Threat Intelligence
0
"On several occasions the Russian military has coupled its cyberattacks with conventional weapons aimed at the same targets." (Source : Microsoft)

On several occasions the Russian military has coupled its cyberattacks with conventional weapons aimed at the same targets.

 

🚩The Ukraine-Russia war is unique in our modern history, as it is the first time at the age of digitalization that the full spectrum of conventional and unconventional strategical powers is deployed by or against a Security Council member (Structural Power, 1982, Susan Strange) :

  • Military, security & intelligence
  •  Industry and logistics
  • Economy, Currency & Credit
  • Communication, Influence and Knowledge
  • Citizen Welfare
  • Energy and raw materials

🎙️Brad Smith (President and Vice Chairman at Microsoft)  highlight another uniqueness. In its opening of Microsoft’s report, “Defending Ukraine : Early Lessons from the Cyber War” : “The recorded history of every war typically includes an account of the first shots fired and who witnessed them.”

And the first shot in our case was a malicious software : FoxBlade.

💡Five key takeaways :

  • Defense against a military invasion now requires the use of digital operation
  • Cybersecurity is mandatory in a nation defensive toolbox
  • Espionnage operations can project themselves quickly and quietly outside the war zone using Internet
  • Cyberattacks and Influence operations goes hand-in-hand
  • Entanglement of Physical, computerized and cognitive offensive operations that are supporting one another. Defensive strategies must consider this coordination and treating them together without analytical silos.

In April 2022, cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom released a joint publication. The report said that Russian government-sponsored cyber attacks are increasing with both the involvement of cybercrime gang and intelligence agencies. The potential cyberattacks can target organizations or countries other than Ukraine, including destructive malware, ransomware, DDoS attacks, and cyber espionage.

In may 2022, one of such affiliated cybercrime gang attacked Lithuanian websites and  the government of Costa Rica in retaliation to their support to Ukraine. They impacted the country’s foreign trade by disrupting its customs and taxes platforms by breaking into Costa Rica’s Ministry of Finance.

 

🔎Full Microsoft report

Tags: CyberespionageDDOSDestructive malwareGeopoliticsInfluence operationPhysical SecurityransomwareWarfare

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    0 shares
    Share 0 Tweet 0
  • Understanding and Mitigating the Risk of Computer Memory Exploitation

    0 shares
    Share 0 Tweet 0
  • Three Social Impacts of Ransomware Operations

    0 shares
    Share 0 Tweet 0
  • Methods to Conduct an Insider Threat Risk Assessment

    0 shares
    Share 0 Tweet 0
  • Cyber War, Undefined By Military, Rationalized By Insurers

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}