ESET Research Podcast: Ukraine’s past and present cyberwar

Cyber Security

Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country

Long before the first Russian soldier set foot on Ukrainian soil, the country had been a target of sophisticated digital operations spying on its officials, and sabotaging its critical infrastructure and other sectors. It was even the ground zero for the most destructive cyberattack in history, known as NotPetya.

That trend continues during the current crisis. ESET researchers have uncovered an array of new, advanced cyberthreats infiltrating Ukrainian governmental organizations with a single goal – to cause as much damage as possible. Besides describing the tactics, techniques, and procedures of these threats, we provide context and explain when such attacks against Ukraine started, how they evolved over time, which of them could be considered successful, and what to expect in the future.

We invite you to join ESET Distinguished Researcher Aryeh Goretsky, ESET Head of Threat Research Jean-Ian Boutin, and ESET Senior Malware Researcher Robert Lipovsky in their discussion of these recent attacks in the context of years of cyberattacks targeting Ukraine.

For additional information on the topic, visit Ukraine Crisis – Digital Security Resource Center.

If you like what you heard in the podcast, subscribe to the ESET Research podcast on any of the popular podcast applications including Spotify, Google Podcasts, Apple Podcasts, and PodBean.

Products You May Like

Articles You May Like

Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
Italy’s Data Protection Watchdog Issues €15m Fine to OpenAI Over ChatGPT Probe
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks
Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts
Ransomware Attack Exposes Data of 5.6 Million Ascension Patients

Leave a Reply

Your email address will not be published. Required fields are marked *