ESET Research Podcast: Ukraine’s past and present cyberwar

Cyber Security

Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country

Long before the first Russian soldier set foot on Ukrainian soil, the country had been a target of sophisticated digital operations spying on its officials, and sabotaging its critical infrastructure and other sectors. It was even the ground zero for the most destructive cyberattack in history, known as NotPetya.

That trend continues during the current crisis. ESET researchers have uncovered an array of new, advanced cyberthreats infiltrating Ukrainian governmental organizations with a single goal – to cause as much damage as possible. Besides describing the tactics, techniques, and procedures of these threats, we provide context and explain when such attacks against Ukraine started, how they evolved over time, which of them could be considered successful, and what to expect in the future.

We invite you to join ESET Distinguished Researcher Aryeh Goretsky, ESET Head of Threat Research Jean-Ian Boutin, and ESET Senior Malware Researcher Robert Lipovsky in their discussion of these recent attacks in the context of years of cyberattacks targeting Ukraine.

For additional information on the topic, visit Ukraine Crisis – Digital Security Resource Center.

If you like what you heard in the podcast, subscribe to the ESET Research podcast on any of the popular podcast applications including Spotify, Google Podcasts, Apple Podcasts, and PodBean.

Products You May Like

Articles You May Like

How adware exposed victims to kernel-level threats – Week in Security with Tony Anscombe
CrowdStrike Fault Causes Global IT Outages
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
Chinese Hackers Target Taiwan and US NGO with MgBot Malware
CrowdStrike Shares How a Rapid Response Content Update Caused Global Outage

Leave a Reply

Your email address will not be published. Required fields are marked *