15.06.2022

The 15th of June, Cyber News

Ukraine   

How Cyberattacks Affect the Work of Civil Servants

About half of the cyber attacks in the world, according to Microsoft, are directed against government agencies. Ukraine is no exception. Our civil servants receive letters from the representatives of russia’s military intelligence service and FSB members more often than from their colleagues from other countries. At the same time, the enemy is well aware of what he is doing: letters are often disguised as important information about the rules of social protection or new statements by the political leadership. During the world’s first cyber war, hackers were unable to find a vulnerability and access Ukrainian registries or critical infrastructure. We stand because the state has long increased cyber resilience: through international cooperation, changes in legislation, strengthening staff and equipment. Every time russian hackers manage to gain access to a government official’s account, your country becomes more vulnerable to putin. A little more, one more small step. During the year before the invasion, russian military hackers intensified cyber-espionage operations against Ukraine’s information systems. Every access lost by someone somewhere in a ministry or other government agency cost us the lives of our people later on. In the hands of every civil servant today, no matter what high or low position he holds – a huge power. Authorities do not open or open a phishing letter and give access to their account to an FSB officer [1].

russia  

Results of IT Army Attacks [2].

The 15th of June, Cyber News

Russian «Izvestia» Wrote that Donbas Will Be Restored Due to Falling Living Standards of russians. And Then They Disowned the Publication

On June 12, the russian newspaper Izvestia published an appeal on behalf of the first deputy head of the russian presidential administration, Sergei Kiriyenko. The appeal concerned the so-called «Day of russia» and was addressed to residents of Ukrainian territories temporarily occupied by the russians. In general, the text of the appeal consisted of narratives of russian propaganda about «one people», «Nazis», «get up from your knees» and «oppression» of russian-speaking citizens, but ended with the words: «All russia will rebuild Donbas, which was destroyed by the Nazis». Yes, it will cost several trillion rubles. But this money will be allocated from the russian budget, even at the cost of temporarily reducing the living standards of the country». This text was later removed from the site, but an archived version can be found. The Izvestia editorial office published an explanation of this publication. The publication reported that such an appeal allegedly did not exist at all, and the appearance of the material on the site is a consequence of the «hacker attack»[3].

World  

The Attention of Cybercriminals to Cloud Platforms Is Proportional to Their Popularity

As more and more consumers switch to cloud technology, cybercriminals are also showing increased interest in them, targeting primarily the largest market players. According to data collected by the Atlas VPN team, as of April, Amazon Web Services (AWS) has experienced the largest number of exploits among cloud service providers. A total of 10 attacks were carried out on this platform, which is almost a fifth (18.9%) of all such events in the first four months of this year. Cloud threats are those cyber events that use the cloud in one or more stages of an attack. The figures are based on data collected by Hackmageddon. The data includes major cloud incidents reported from January to April.

The 15th of June, Cyber News

The second place in the list is occupied by five services. Microsoft OneDrive, Discord, Dropbox, Google Drive and GitHub – each faced five threats, accounting for 9.4% of the total. The majority (64.8%) of the exploits were aimed at delivering malicious code or a phishing page. In total, 18.5% of services were used as a command and control infrastructure. At the same time, 16.7% were sent to steal data or launch other attacks [4].