Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Russia, Ukraine Conflict Escalation Mirrored in Malware Activity

Political conflicts in the physical world have played out in the digital world more than once in the past. According to new research from FireEye, it may be happening yet again for people in Russia and the Ukraine.

Political conflicts in the physical world have played out in the digital world more than once in the past. According to new research from FireEye, it may be happening yet again for people in Russia and the Ukraine.

In an analysis of malware “callbacks” – communications made from compromised computers to an attacker’s first-stage command-and-control server – researchers at FireEye found that callback activity involving Russia and the Ukraine increased as the military conflict escalated. In a list of the top 20 countries to receive first-stage malware callbacks during the last 16 months, Russia and Ukraine ranked fifth and ninth respectively. In 2013 however, Russia was on average number seven on the list while Ukraine was 12.

The biggest single monthly jump occurred March 2014, when Russia moved from seven on the list to number three. It was during that month that Russia President Vladimir Putin signed a bill annexing Crimea into the Russian Federation and Russian military forces began to gather on the Ukrainian border.

As the conflict escalated, there were also attacks on NATO Websites by hacktivists protesting NATO involvement. There were also reports of other politically-motivated attacks as well

Kenneth Geers, senior global threat analyst at FireEye, noted in a blog post that the rise in callbacks to Russia and Ukraine was drastically different than what many other countries were experiencing between February and March. In fact, he noted, nearly half of the world’s countries experienced a decrease in callbacks during that time period.

“It is not my intention here to suggest that Russia and/or Ukraine are the sole threat actors within this data set,” he blogged. “I also do not want to speculate too much on the precise motives of the attackers behind all of these callbacks. Within such a large volume of malware activity, there are likely to be lone hackers, “patriotic hackers,” cyber criminals, Russian and Ukrainian government operations, and cyber operations initiated by other nations.”

“What I want to convey in this blog is that generic, high-level traffic analysis – for which it is not always necessary to know the exact content or the original source of individual communications – might be used to draw a link between large-scale malware activity and important geopolitical events,” he explained. “In other words, the rise in callbacks to Russia and Ukraine (or to any other country or region of the world) during high levels of geopolitical tension suggests strongly that computer network operations are being used as one way to gain competitive advantage in the conflict.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...