Close Menu
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    TopBuzzMagazine.com
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    • Home
    • Movies
    • Television
    • Music
    • Fashion
    • Books
    • Science
    • Technology
    • Cover Story
    • Contact
      • About
      • Amazon Disclaimer
      • Terms and Conditions
      • Privacy Policy
      • DMCA / Copyrights Disclaimer
    TopBuzzMagazine.com
    Home»Technology»Ukraine Websites Hit by More Cyberattacks, Destructive Malware
    Technology

    Ukraine Websites Hit by More Cyberattacks, Destructive Malware

    By AdminJune 14, 2022
    Facebook Twitter Pinterest LinkedIn Tumblr Email

    Ukraine’s parliament and other government and banking websites were hit with another punishing wave of distributed-denial-of-service attacks Wednesday, and cybersecurity researchers said unidentified attackers had also infected hundreds of computers with destructive malware.

    Some of the infected computers were in neighbouring Latvia and Lithuania, the researchers said.

    Early Thursday local time in Ukraine, as fears of a Russian invasion heightened, the foreign ministry and council of ministers were unreachable and other sites were slow to load, suggesting the DDoS attacks were continuing, though there was no official confirmation.

    Officials have long expected cyberattacks to precede and accompany any Russian military incursion, and analysts said the activity hewed to Russia’s playbook of wedding cyber operations with real-world aggression.

    ESET Research Labs said it detected a previously unseen piece of data-wiping malware Wednesday on “hundreds of machines in the country.” It was not clear how many networks were affected.

    Breaking. #ESETResearch discovered a new data wiper malware used in Ukraine today. ESET telemetry shows that it was installed on hundreds of machines in the country. This follows the DDoS attacks against several Ukrainian websites earlier today 1/n

    — ESET research (@ESETresearch) February 23, 2022

    “With regards whether the malware was successful in its wiping capability, we assume that this indeed was the case and affected machines were wiped,” said ESET research chief Jean-Ian Boutin. He would not name the targets but said they were “large organisations.” ESET was unable to say who was responsible.

    Symantec Threat Intelligence detected three organisations hit by the wiper malware — Ukrainian government contractors in Latvia and Lithuania and a financial institution in Ukraine, said Vikram Thakur, its technical director. Both countries are NATO members.

    “The attackers have gone after these targets without much caring for where they may be physically located,” he said.

    All three targets had “close affiliation with the government of Ukraine,” said Thakur, saying Symantec believed the attacks were “highly targeted.” He said roughly 50 computers at the financial outfit were impacted, some with data wiped.

    Asked about the wiper attack, senior Ukrainian cyber defense official Victor Zhora had no comment.

    Boutin said the malware’s timestamp indicated it was created in late December.

    “Russia likely has been planning this for months, so it is hard to say how many organisations or agencies have been backdoored in preparation for these attacks,” said Chester Wisniewski, principal research scientist at the cybersecurity firm Sophos. He guessed the Kremlin intended with the malware to “send the message that they have compromised a significant amount of Ukrainian infrastructure and these are just little morsels to show how ubiquitous their penetration is.”

    Word of the wiper follows a mid-January attack that Ukrainian officials blamed on Russia in which the defacement of some 70 government websites was used to mask intrusions into government networks in which at least two servers were damaged with wiper malware masquerading as ransomware.

    Thakur said it was too early to say if the malware attack discovered Wednesday was as serious as the variety that damaged servers in January.

    Cyberattacks have been a key tool of Russian aggression in Ukraine since before 2014, when the Kremlin annexed Crimea and hackers tried to thwart elections. They were also used against Estonia in 2007 and Georgia in 2008.

    Distributed-denial-of-service attacks are among the least impactful because they don’t entail network intrusion. Such attacks barrage websites with junk traffic so they become unreachable.

    The DDoS targets Wednesday included the defense and foreign ministries, the Council of Ministers and Privatbank, the country’s largest commercial bank. Many of the same sites were similarly knocked offline February 13-14 in DDoS attacks that the US and UK governments quickly blamed on Russia’s GRU military intelligence agency

    Wednesday’s DDoS attacks appeared less impactful than the earlier onslaught — with targeted sites soon reachable again — as emergency responders blunted them. Zhora’s office, Ukraine’s information protection agency, said responders switched to a different DDoS protection service provider.

    Doug Madory, director of internet analysis at the network management firm Kentik, recorded two attack waves each lasting more than an hour.

    A spokesman for California-based Cloudflare, which provides services to some of the targeted sites, said DDoS attacks in Ukraine have been sporadic and on the rise in the past month but “relatively modest compared to large DDoS attacks we’ve handled in the past.”

    The West blames Russia’s GRU for some of the most damaging cyberattacks on record, including a pair in 2015 and 2016 that briefly knocked out parts of Ukraine’s power grid and the NotPetya “wiper” virus of 2017, which caused more than $10 billion (roughly Rs. 75,080 crore) of damage globally by infecting companies that do business in Ukraine with malware seeded through a tax preparation software update.

    The wiper malware detected in Ukraine this year has so far been manually activated, as opposed to a worm like NotPetya, which can spread out of control across borders.

    Read The Full Article Here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Adobe Upgrades Firefly Video Model With New Tools and Improved Motion Generation

    July 18, 2025

    ICE Is Getting Unprecedented Access to Medicaid Data

    July 18, 2025

    OpenAI debuts ChatGPT Agent, which can control an entire computer and perform multi-step tasks, powered by a new dedicated model, rolling out to paid users (Hayden Field/The Verge)

    July 17, 2025

    iPhone Models With China-Made Displays Reportedly Face Ban in the US; Apple Says ‘No Effect’ on Products

    July 17, 2025

    Dyneema’s New Fiber Composite Is Lighter, Stronger, and More Durable Than Ever

    July 16, 2025

    US Commerce Secretary Howard Lutnick says Nvidia's planned resumption of its H20 AI chip sales to China is part of US negotiations over rare earths and magnets (Reuters)

    July 16, 2025
    popular posts

    Inside the milk bank creating infant formula for orphaned animals

    Lar Park Lincoln’s Friday the 13th Part 7 Role Explained

    Anglo-Saxon teen girl discovered buried with lavish jewelry strewn across

    Will ‘Jeopardy!’ Do an All-Music Edition? Ken Jennings & More

    Here Are Five Things You Didn’t Know About Doechii

    What mirrored ants, vivid blue butterflies and Monstera house plants

    Marvel Needs to Retire This Tired Character Type

    Categories
    • Books (3,295)
    • Cover Story (5)
    • Events (19)
    • Fashion (2,455)
    • Interviews (43)
    • Movies (2,594)
    • Music (2,873)
    • News (155)
    • Politics (2)
    • Science (4,444)
    • Technology (2,587)
    • Television (3,317)
    • Uncategorized (932)
    Archives
    Facebook X (Twitter) Instagram Pinterest YouTube Reddit TikTok
    © 2025 Top Buzz Magazine. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms of Use and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Cookie SettingsAccept
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT