Skip to main content
https://www.highperformancecpmgate.com/rgeesizw1?key=a9d7b2ab045c91688419e8e18a006621

Microsoft discloses malware attack on Ukraine govt networks

In this undated handout photo released by Ukrainian Foreign Ministry Press Service, the building of Ukrainian Foreign Ministry is seen during snowfall in Kyiv, Ukraine. Ukrainian officials and media reports say a number of government websites in Ukraine are down after a massive hacking attack. While it is not immediately clear who was behind the attacks, they come amid heightened tensions with Russia and after talks between Moscow and the West failed to yield any significant progress this week. (Ukrainian Foreign Ministry Press Service via AP)

Microsoft said on Saturday that dozens of computer systems in an unknown number of Ukrainian government agencies were infected with destructive malware disguised as ransomware, a revelation that suggests a defacement attack that draws attention to official websites was a diversion. 

The extent of the damage was not immediately clear. The attack comes as the threat of a Russian invasion of Ukraine looms and diplomatic talks to resolve the tense standoff appear to have stalled. Microsoft said in a short blog post that this amounted to the sound of an industry alert that it first detected the malware on Thursday.

This would coincide with the attack which temporarily took some 70 government websites offline. The disclosure followed a Reuters report earlier in the day quoting a senior Ukrainian security official as saying the disfigurement was indeed a cover for a malicious attack.

Separately, a senior private sector cybersecurity official in Kyiv told The Associated Press how the attack was successful: intruders entered government networks through a shared software vendor in a self -so-called SolarWinds 2020 Russian cyber-espionage campaign-style supply chain attack against Microsoft said in another technical article that the affected systems "spread across multiple government, non-profit, and  technology and information Technology Organization.

 "The malware is disguised as ransomware but, if activated by the attacker, would render the infected computer system inoperable," Microsoft said. In short, there is no ransom recovery mechanism. 

Microsoft said the malware "runs when an associated device is turned off," a typical initial reaction to a ransomware attack. Microsoft said it was not yet able to assess the purpose of the destructive activity or associate the attack with a known threat actor. 

Ukrainian security official Serhiy Demedyuk was quoted by Reuters for claiming that the attackers used malware similar to that used by Russian intelligence services. He is Deputy Secretary of the National Security and Defense Council.


 

Comments

Popular posts from this blog

Uber co-founder Garrett Camp steps back from board director role

Uber co-founder Garrett Camp is relinquishing his role as a board director and switching to board observer — where he says he’ll focus on product strategy for the ride hailing giant. Camp made the announcement in a short Medium post in which he writes of his decade at Uber: “I’ve learned a lot, and realized that I’m most helpful when focused on product strategy & design, and this is where I’d like to focus going forward.” “I will continue to work with Dara [Khosrowshahi, Uber CEO] and the product and technology leadership teams to brainstorm new ideas, iterate on plans and designs, and continue to innovate at scale,” he adds. “We have a strong and diverse team in place, and I’m confident everyone will navigate well during these turbulent times.” The Canadian billionaire entrepreneur signs off by saying he’s looking forward to helping Uber “brainstorm the next big idea”. Camp hasn’t been short of ideas over his career in tech. He’s the co-founder of the web 2.0 recommendatio

Drone crash near kids leads Swiss Post and Matternet to suspend autonomous deliveries

A serious crash by a delivery drone in Switzerland have grounded the fleet and put a partnership on ice. Within a stone’s throw of a school, the incident raised grim possibilities for the possibilities of catastrophic failure of payload-bearing autonomous aerial vehicles. The drones were operated by Matternet as part of a partnership with the Swiss Post (i.e. the postal service), which was using the craft to dispatch lab samples from one medical center for priority cases. As far as potential applications of drone delivery, it’s a home run — but twice now the craft have crashed, first with a soft landing and the second time a very hard one. The first incident, in January, was the result of a GPS hardware error; the drone entered a planned failback state and deployed its emergency parachute, falling slowly to the ground. Measures were taken to improve the GPS systems. The second failure in May, however, led to the drone attempting to deploy its parachute again, only to sever the line

How the world’s largest cannabis dispensary avoids social media restrictions

Planet 13 is the world’s largest cannabis dispensary. Located in Las Vegas, blocks off the Strip, the facility is the size of a small Walmart. By design, it’s hard to miss. Planet 13 is upending the dispensary model. It’s big, loud and visitors are encouraged to photograph everything. As part of the cannabis industry, Planet 13 is heavily restricted on the type of content it can publish on Instagram, Facebook and other social media platforms. It’s not allowed to post pictures of buds or vapes on some sites. It can’t talk about pricing or product selection on others.   View this post on Instagram   A post shared by Morgan Celeste SF Blogger (@bayareabeautyblogger) on Jan 25, 2020 at 7:54pm PST Instead, Planet 13 encourages its thousands of visitors to take photos and videos. Starting with the entrance, the facility is full of surprises tailored for the ‘gram. As a business, Planet 13’s social media content is heavily restricted and monito