Russia and Ukraine cyber dispute analyzed by FireEye

FireEye has issued data which show the intensification of activities in the cyberspace correspondent  to geopolitical tension between Russia and Ukraine.

The Geopolitical dispute between Russia and Ukraine has its correspondence in the cyberspace, principal security experts have observed an increase in the number of cyber attacks between the two countries. Cyber units on both sides may be actively engaged in online campaigns, in the recent weeks it has been observed the rise of DDoS attacks and cyber attack malware-based, according data provided by security firm FireEye.
Experts at FireEye have collected evidence of the intense activity in the cyberspace between Russia and Ukraine, the analysts have focused the investigation on malware “callbacks”, the communications initiated from an infected PC to the C&C server, over the past 16 months.
“One of the most reliable ways to discover computer network operations is to look for malware “callbacks” – the communications initiated from compromised computers to an attacker’s first-stage command-and-control (C2) server. At FireEye, we detect and analyze millions of such callbacks every year.” “As we track the evolution of callbacks during this period, we see a likely correlation between the overall number of callbacks both to Russia and to Ukraine, and the intensification of the crisis between the two nations,” wrote FireEye senior global threat analyst, Kenneth Geers.
In the following table is proposed the list of nations by number of malware callbacks, concurrently with  geopolitical tensions Ukraine has jumped from #12 to #9 Russia is passed from an average #7 to #5.
The greatest jump in the malware callback data occurred in March 2014, exactly in the same period the Russian Government authorized the military force in the Crimea, many experts have found many similarities with tactic adopted by cyber units against Georgia in 2008.
“The rise in callbacks to Russia and Ukraine (or to any other country or region of the world) during high levels of geopolitical tension suggests strongly that computer network operations are being used as one way to gain competitive advantage in the conflict.” states the post.
Below the list of events occurred in March:
  • Russia’s parliament authorized the use of military force in Ukraine;
  • Vladimir Putin signed a bill incorporating the Crimean peninsula into the Russian Federation;
  • The U.S. and EU imposed travel bans and asset freezes on some senior Russian officials;
  • Russian military forces massed along the Ukrainian border; and
  • Russian energy giant Gazprom threatened to cut off Ukraine’s supply of gas

 

FireEye observed malicious traffic from any country of the globe, malware callbacks to Russia from compromised computers in a range of countries, including US, Italy, South Korea and Japan.
“It is important to note that nearly half of the world’s countries experienced a decrease in callbacks during this same time frame,” reports the blog post.
Who is behind the cyber operations?
The experts highlighted that it isn’t his intention to suggest that Russia and/or Ukraine are the sole threat actors within the data set proposed and he doesn’t speculate on the precise motives of the attackers behind all of these malware callbacks.
“Within such a large volume of malware activity, there are likely to be lone hackers, ‘patriotic hackers’, cyber criminals, Russian and Ukrainian government operations, and cyber operations initiated by other nations,” Geers said.
Personally, I have no doubts, the rise in malware callbacks in Russia and Ukraine superior to the increment observed in any other area and is for sure related the high level of the geopolitical tension.
The analysis of the cyberspace could provide reliable indicators on political and economical issues in specific countries of the planet, the information collected by FireEye could be integrated for example with data related to the analysis of social media and Tor network use to make a complete picture of the dispute.
This is the new edge of the intelligence.

Pierluigi Paganini

(Security Affairs –  Russia and Ukraine, malware callbacks)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

8 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

14 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

21 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

21 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.