February 23, 2022
Both public and private organizations in Ukraine recently experienced a wave of cyber attacks, believed to originate from a nation-state, involving the disruption of government websites and the spread of malicious software, otherwise known as malware. While defacing websites is a more public attack, malware distribution is of greater concern because of its potential for creating widespread damage. While the incidents have so far been limited to Ukraine, this could be a precursor for increased malicious cyber activity across the U.S. and Europe.
Recent Developments
- February 23, 2022 | Cybersecurity & Infrastructure Security Agency (CISA) SHIELDS UP Advisory: CISA “recommends all organizations—regardless of size—adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets”
- February 23, 2022 | NCSC Alert: New Sandworm malware Cyclops Blink replaces VPNFilter
- March 15, 2022 | CISA & FBI Joint Cybersecurity Advisory: Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability
- March 24, 2022 | CISA, FBI, & DOE Joint Cybersecurity Advisory: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector