ESET Research Podcast: Ukraine’s past and present cyberwar

Cyber Security

Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country

Long before the first Russian soldier set foot on Ukrainian soil, the country had been a target of sophisticated digital operations spying on its officials, and sabotaging its critical infrastructure and other sectors. It was even the ground zero for the most destructive cyberattack in history, known as NotPetya.

That trend continues during the current crisis. ESET researchers have uncovered an array of new, advanced cyberthreats infiltrating Ukrainian governmental organizations with a single goal – to cause as much damage as possible. Besides describing the tactics, techniques, and procedures of these threats, we provide context and explain when such attacks against Ukraine started, how they evolved over time, which of them could be considered successful, and what to expect in the future.

We invite you to join ESET Distinguished Researcher Aryeh Goretsky, ESET Head of Threat Research Jean-Ian Boutin, and ESET Senior Malware Researcher Robert Lipovsky in their discussion of these recent attacks in the context of years of cyberattacks targeting Ukraine.

For additional information on the topic, visit Ukraine Crisis – Digital Security Resource Center.

If you like what you heard in the podcast, subscribe to the ESET Research podcast on any of the popular podcast applications including Spotify, Google Podcasts, Apple Podcasts, and PodBean.

Products You May Like

Articles You May Like

The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
Chinese APT Group Targets Telecom Firms Linked to Belt and Road Initiative
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

Leave a Reply

Your email address will not be published. Required fields are marked *