Threat Intelligence logo

[Alert] Russia-Ukraine Situation: Increase in major security breaches

Threat Intelligence • March 9, 2022

With the escalating Russia-Ukraine situation, organizations globally are being urged to urgently increase their cyber security posture.
Threat Actors have deployed destructive malware in relation to the Russia-Ukraine crisis known as WhisperGate and HermeticWiper Malware.
Global events, such as pandemics, global financial crisis, and now war, trigger significant increases in security breaches.
Financially motivated threat actor groups are very opportunistic and will launch attack campaigns including war themed phishing and malware campaigns.
As the war continues to escalate, politically motivated threat actor groups will rise and perform both broad and targeted attacks against companies.
State sponsored threat actors are also likely to target, and escalate existing access, within specific organisations including critical infrastructure providers.

What do you need to do?

Exploitable Vulnerabilities

Identify and remediate critical exploitable vulnerabilities that are internet accessible.

Supply Chain Breaches

Prevent third-party breaches affecting you. Implement 2FA, monitor for leaked passwords, and restrict access to external providers.

Detect Breaches

Security monitoring to detect indicators of compromise and C2 or ransomware traffic is critical to be able to respond.

Incident Response

Russian threat actors have been seen to move laterally in a breached company within 19 minutes. It is critical that breaches can be contained within minutes to prevent major financial and privacy impacts.

How can Threat Intelligence help?

Threat Intelligence can orchestrate and automate all of these capabilities through our Evolve platform in less than an hour to provide on-demand security enhancements.
Our specialist security team can also provide advice and services to help keep your business safe.
Contact us now.

Share

A man is sitting in front of a laptop computer.
By Threat Intelligence March 13, 2025
Learn about the prevalent threats targeting enterprises today and the advanced solutions designed to combat them effectively in this blog post.
An illustration of a laptop with a shield and a bottle coming out of it.
By Threat Intelligence March 6, 2025
Boost your cybersecurity with EDR. Detect and stop advanced threats, enhance visibility, and streamline response. Explore best practices and top tools now.
Two men are running away from a laptop with a clock coming out of it.
By Threat Intelligence February 27, 2025
In this article, we will delve into the concept of critical incident response time and its crucial role in safeguarding your organization's cybersecurity.
A group of people are sitting around a table with a check mark on it.
By Anupama Mukherjee February 20, 2025
Explore the world of cybersecurity preparedness through real-life tabletop exercise scenarios.

Related Content

Share by: