Threat Intelligence logo

[Alert] Russia-Ukraine Situation: Increase in major security breaches

Threat Intelligence • March 9, 2022

With the escalating Russia-Ukraine situation, organizations globally are being urged to urgently increase their cyber security posture.
Threat Actors have deployed destructive malware in relation to the Russia-Ukraine crisis known as WhisperGate and HermeticWiper Malware.
Global events, such as pandemics, global financial crisis, and now war, trigger significant increases in security breaches.
Financially motivated threat actor groups are very opportunistic and will launch attack campaigns including war themed phishing and malware campaigns.
As the war continues to escalate, politically motivated threat actor groups will rise and perform both broad and targeted attacks against companies.
State sponsored threat actors are also likely to target, and escalate existing access, within specific organisations including critical infrastructure providers.

What do you need to do?

Exploitable Vulnerabilities

Identify and remediate critical exploitable vulnerabilities that are internet accessible.

Supply Chain Breaches

Prevent third-party breaches affecting you. Implement 2FA, monitor for leaked passwords, and restrict access to external providers.

Detect Breaches

Security monitoring to detect indicators of compromise and C2 or ransomware traffic is critical to be able to respond.

Incident Response

Russian threat actors have been seen to move laterally in a breached company within 19 minutes. It is critical that breaches can be contained within minutes to prevent major financial and privacy impacts.

How can Threat Intelligence help?

Threat Intelligence can orchestrate and automate all of these capabilities through our Evolve platform in less than an hour to provide on-demand security enhancements.
Our specialist security team can also provide advice and services to help keep your business safe.
Contact us now.

Share

A man in a hood is standing in front of a computer screen.
By Threat Intelligence February 7, 2025
Actionable threat intelligence is distilled, contextual and real-time data about threats and threat actors that empowers security teams to identify, prioritise and mitigate security risks.
A person wearing a mask and a hood is sitting in front of a computer screen.
By David Gilmore January 31, 2025
As AI agents gain autonomy, securing their authentication is critical. Learn about the risks, attack surfaces, and cybersecurity challenges in the era of agentic AI.
A red padlock in a circle on a black background.
By Anupama Mukherjee January 30, 2025
And as the year draws to a close, the question that remains is: What will the new year hold for the cybersecurity industry? Find out in this blog post!
Two computer monitors are sitting on a desk next to each other.
By Threat Intelligence January 16, 2025
SIEM software uses advanced detection, analytics, and response capabilities to provide insights into everything going on within an IT environment.

Related Content

Share by: