The 17th of June, Cyber News


Ukraine Is the 24th in the Ranking of Cybersecurity

Ukraine received a score of 75.32 in the National Cyber Security Index and ranked the 24th in the ranking. This figure is much higher than average. Greece (96), Belgium (93), Lithuania (93), Estonia (90), Czech Republic (92), Germany (90), Portugal (89), Spain (88), Poland (87), Finland (87), Finland (85), Sweden (84). Ukraine with a score of 75.32 is ahead of some European countries. For example, Austria, Ireland and Norway. And significantly ahead of countries from other regions. The aggressors of the russian Federation and the Republic of belarus received only 71 and 53 in the rating.

The 17th of June, Cyber News

The National Cyber Security Index is a global index that measures countries’ readiness to prevent cyber threats and manage cyber incidents [1].


Hackers Have Stolen the Information about 65 Million of russians since the Start of the War in Ukraine

More than 100,000 people are involved in cyberattacks against russia. Since the beginning of the war, hackers have been attacking russian resources more actively: the number of hacker attacks has increased about 15 times. As a result of their activities, the data of 65 million of russians were stolen. This was announced by Deputy Chairman of the Board of Sberbank Stanislav Kuznetsov during the St. Petersburg International Forum. “At least 13 million compromised cards have been recorded since then. At the same time, Sberbank issued 1 million cards, the remaining 12 million cards go to other companies. The minimum loss for the reissue of these cards is at least 4.5 billion rubles”,  said Kuznetsov [2].

The Cost of russia’s Cyberattack is at Least $ 1 Million

Since the beginning of the full-scale russian invasion, 688 cyberattacks have been recorded in the Ministry of Digital Affairs, Deputy Minister of Digital Transformation Georgy Dubinsky told LIGA.net. The Deputy Head of the Ministry of Digital Affairs reminded that in January and February Ukraine experienced very massive cyber attacks, which can be considered a preparatory phase for kinetic aggression. The russians tested the Ukrainian system for resilience, for failure due to DDoS-attack. «We can claim coordinated actions of the russian military with cyber units of the GRU, MoD and russian federation Foreign Intelligence Service. These were supported by the aggressor country of the attack. Given the density and strength of such an attack costs at least a million dollars,» said Dubinsky. According to him, the action was attacked with a high density — 600,000 packets of harmful traffic per second [3].

Activities Anonymous

«It will help to end the war»: Anonymous hackers have hacked russian drone companies. A user with the nickname YourAnonSpider posted the data on Twitter.

The 17th of June, Cyber News

As a result of the hacker attack, the characteristics and details of the production of three new UAVs were revealed: «Helios», «Thunder» and «Orion-E». The archive contains presentations and technical documentation of the joint-stock financial corporation «System», the company «Kronstadt» (LLC «ITR») and the joint-stock company «rosoboronexport». They reveal the characteristics and even details of the production of two russian drones «Helios» and «Orion-E». Hackers also posted a document on the cyber attack on Kronstadt. According to the text, virus software was found in the company’s system, due to which a third-party cybersecurity company BIZON investigated and recommended protection measures. Knowing about the vulnerability, which experts have not found, hackers can carry out a re-attack.

The 17th of June, Cyber News

«Plans and tactics of russian drones have been broken. We hope this information will help to end the war as soon as possible, no war can be justified!» — Hackers noted in their tweet [4].


Microsoft Acquires Miburo Cybersecurity Analysis Company

As it became known, Microsoft has signed an agreement to acquire Miburo, a company that analyzes cybersecurity threats. The transaction price is not announced. Founded in 2011, Miburo specializes in detecting and responding to so-called foreign information transactions, primarily state-funded, to influence public opinion. Miburo describes itself as an interdisciplinary team of researchers and consultants who help protect the free information environment, democracy and citizens from extremism and authoritarian influence. The company’s research teams detect malicious and extremist campaigns of influence in more than ten languages. Miburo offers customers a quick assessment of the situation in terms of cultural understanding and geopolitical realities. According to the description, the Miburo team uses expertise from academia, government and the private sector to help companies develop proactive strategies to reduce risks in cyberspace. The startup also offers personal and online training for law enforcement, military, intelligence and cybersecurity professionals to provide a strategic understanding of the situation and a tool to mitigate various threats. Upon completion of the acquisition, Miburo will become part of Microsoft Customer Security and Trust. Tom Burt, Microsoft’s corporate vice president of security and customer trust, wrote in a blog post that Miburo will allow the corporation to expand its capabilities to identify and analyze threats to combat new cyberattacks, as well as shed light on how foreign entrants use information operations together with other cyberattacks to achieve their goals [5].

Microsoft Recommends Upgrading Windows Due to a Hacker Threat

Microsoft has identified a vulnerability in Windows that is being actively exploited by hackers. Users with Windows 7 and later are advised to install the update. A Follina security bug allowed attackers to access Windows users’ computers through Microsoft Word. The security team had been aware of the threat since May, but could not confirm the findings for some time and denied them. Malicious documents use the Follina exploit to gain control of the Microsoft Support Diagnostic Tool (MSDT) to execute commands. You can use it to install programs, create new user accounts, delete or modify data stored on your computer [6].