Cyber Shadows Over Ukraine: An Independence Day Perspective

The article "Cyber Shadows Over Ukraine" highlights the increased cyber threats Ukraine faces around its Independence Day, particularly from groups like NoName and the Russian Cyber Army. These attacks, primarily targeting government and critical infrastructure, underscore the need for Ukraine to bolster its cybersecurity defenses to ensure the safety and resilience of its national systems during this vulnerable period

CloudSEK TRIAD
August 23, 2024
Green Alert
Last Update posted on
August 26, 2024
Table of Contents
Author(s)
No items found.

Category: Adversary Intelligence

Region: Ukraine

TLP: GEEEN

Executive Summary

This report analyzes the evolving cyber threat landscape surrounding Ukraine's Independence Day (August 24th), holds profound national significance, especially in light of the country's ongoing conflict with Russia., This occasion could be a focal point for heightened tensions and vulnerabilities in the cyber domain. Ukraine experienced ongoing sophisticated cyberattacks targeting critical infrastructure, government institutions, and civil society, orchestrated by both state-sponsored and non-state actors. In the last three months 458 incidents of cyber attacks happened in Ukraine mostly consisting of DDOS followed by Defacement and Databreachs. ”NoName" is the most active group targeting Ukraine, responsible for 36% of attacks, making it a key player in the cyber threat landscape. The "Russian Cyber Army" follows closely, highlighting significant Russian involvement. Groups like Anonymous RUSSIA, Autodafe Internet, BLOODNET, Skillnet, 22C and RipperSec contribute to a diverse threat landscape. Other groups, including Sulawesi Cyber Team, CyberDragon, and Doubleface, also pose a risk, despite their lower activity levels.

Ukraine Cyber Threat Landscape: Industry Specific Insight

In Ukraine, cyber attacks have significantly impacted numerous industries, with over 482 incidents reported in the last three months. Various hacktivist groups have been behind these attacks, with Noname being the most active. These cyber assaults have affected a broad range of industries, causing substantial disruptions and financial losses.

The government sector is the primary target, facing nearly 50% of cyberattacks, indicating a focus on critical infrastructure and sensitive data. The technology and transportation sectors are also heavily impacted, each with over 10% of attacks, exposing vulnerabilities in essential services. Other industries, such as energy, media, and education, also face significant risks.

The chart below provides a detailed overview of the threat landscape, highlighting the specific industries in Ukraine that have been impacted by cyber attacks.

Ukraine Threat Landscape industry specific: Last three months statistics

Key Observations from the Chart:

  • Government Sector: The government sector is by far the most targeted, accounting for nearly 50% of cyberattacks. This suggests that critical infrastructure and sensitive information are prime targets for attackers.
  • Technology and Transportation: Following the government, technology and transportation sectors are also significantly impacted, each with over 10% of the total attacks. This highlights the vulnerability of essential services and supply chains to cyber threats.
  • Other Sectors: While the government, technology, and transportation sectors dominate the threat landscape, other industries like energy, media, and education also face a notable risk.

Top Hacktivist Groups Targeted Ukraine

  • NoName's Dominance: The most prominent group targeting Ukraine is "NoName," accounting for a substantial 36% of the attacks. This suggests that NoName is a significant player in the cyber threat landscape against Ukraine.
  • Russian Cyber Army: The "Russian Cyber Army" is the second most active group, indicating that Russian-affiliated entities are actively involved in cyberattacks against Ukraine.
  • Diverse Threat Actors: A wide range of other hacktivist groups, including Anonymous RUSSIA, Autodafe Internet, BLOODNET, Anonymous Guys , Skillnet and RipperSec, are also involved, suggesting a diverse threat landscape with various motivations and capabilities.
  • Smaller Groups: Several smaller groups, such as Sulawesi Cyber Team, CyberDragon, and Doubleface, account for relatively small percentages of the attacks, but their involvement still poses a threat to Ukraine's cybersecurity.
Top Hacktivist Groups targeted Ukraine

Ukraine Cyber Threat Landscape: Attacks Type Insight

Ukraine continues to face a diverse array of cyber attacks, including malware infections, data breaches, Distributed Denial of Service (DDoS) attacks, and website defacements. 

  • DDOS: Denial-of-Service (DDoS) attacks are the most prevalent type, accounting for a substantial 68.1% of the total attacks. This indicates that DDoS attacks are a significant threat to online systems and services.
  • Defacement: Defacement attacks, where attackers modify or alter the content of websites, constitute 21.7% of the attacks. This suggests that attackers are targeting websites for disruption or propaganda purposes.
  • Data Breach and Malware: Data breaches and malware attacks, while less frequent than DDoS and defacement, still pose significant risks. Data breaches can lead to sensitive information theft, and malware can compromise systems and networks.
  • Phishing: Phishing attacks, which attempt to trick individuals into disclosing personal information, are relatively rare, accounting for only 0.4% of the attacks. However, they can still be effective in compromising individual accounts and systems.

Ukraine Threat Landscape Attack method specific: Last three months statistics

Data Breaches: 

This part outlines recent major data breaches affecting Ukraine, focusing on the compromised databases of key institutions and government entities, along with the sale of sensitive personal information. These breaches emphasize the severe risks posed by unauthorized access to personal and financial data, including the potential for identity theft, financial fraud, and significant operational disruptions.

  • A threat actor known as dk0m posted on the underground forum, claiming to possess Ukrainian confidential data, including justice, court, country data, statistics, and exchange data. The actor is offering to sell the data via Telegram and has provided samples of the data. The post also contains a list of Ukrainian Justice Ministry contacts.
Ukraine Confidential Data available on Darkweb forum
  • An underground forum user named dk0m was selling access to a Ukrainian court account that provides the ability to apply to various law enforcement agencies. The user has provided samples of court documents obtained using the account. The price for the account is determined through private messages.  (2024-08-17)
Threat actor selling Ukraine court account with law enforcement data on Dark Web forum

  • A threat actor known as EmailBroker was offering to sell a collection of Ukraine Cyber Police and Government emails on the underground forum. The actor claims to possess a database containing sensitive information and is seeking potential buyers. The actor encourages interested parties to contact them directly on the forum, and escrow is accepted as a payment method.

Threat actor selling  Ukraine Cyber Police and Government emails data on Dark Web forum

  • A threat actor known as Yua8186 posted on the underground forum, claiming to possess a massive database containing personal information of 56 million Ukraine residents. The actor has provided links to eight cloud storage files containing the data. The data is said to include names, addresses, phone numbers, and email addresses of Ukrainian citizens.

Threat actor posted 56 million Ukraine residents data on Dark Web forum

  • A threat actor known as Hoover posted on the underground forum Breach Forums, claiming to possess a 1.01 GB SQL database containing customer information from parfumcity.com.ua. The actor is offering to sell the data for an undisclosed price. The database reportedly contains sensitive information such as names, addresses, phone numbers, email addresses, and order details.
Threat actor posted 1.01 GB SQL database containing customer information from parfumcity.com.ua on Dark Web forum

DDOS: 

Ukraine is heavily impacted by Distributed Denial-of-Service (DDoS) attacks, which make up 68.1% of all cyberattacks. This highlights DDoS as a major threat, severely disrupting online systems and services in the country. 

Trend Analysis:

  • Early June to Mid-June (June 1 - June 15): There is a steady number of attacks, ranging mostly between 4 to 8 incidents per day, indicating a moderate but consistent level of threat.
  • Mid-June to End of June (June 16 - June 30): A spike in activity is observed around June 22, with a peak of around 11 incidents. This period is characterized by heightened activity compared to early June, likely indicating coordinated attack campaigns.
  • Early July to Mid-July (July 1 - July 15): A significant drop in activity is observed, with several days showing minimal or no attacks. This suggests a temporary decline in the threat level, which could be due to several factors such as defensive measures by Ukraine or a strategic pause by the attackers.
  • Mid-July to Early August (July 16 - August 5): The number of incidents begins to rise again, although the intensity remains lower compared to late June. This period shows a gradual increase, indicating a resurgence in DDoS activity.
  • Early August to Mid-August (August 6 - August 15): A sharp increase in incidents is seen, with the number of daily attacks surging past 20 on multiple days. This represents the most intense period of DDoS activity within the timeline, suggesting a highly aggressive cyber campaign against Ukraine.
  • Mid-August to Late August (August 16 - August 22): Although there is a slight decrease compared to the peak in early August, the threat level remains high with around 10-15 incidents daily. This indicates sustained pressure on Ukrainian infrastructure.
DDOS Timeline in Ukraine

Major DDOS Attacks:

  • Anonymous guys have targeted multiple critical infrastructure websites in Ukraine, including the Shipping & Ports Authority, Government Contact Center, Ministry of Infrastructure, Railways Authority, and the Cabinet of Ministers' websites.
Snapshot from Anonymous guy telegram channel 

  • NoName has targeted multiple Telecom service providers (TSP) in Ukraine.
Snapshot from Noname’s telegram channel 

  • The Hacker Council Global targeted Ukraine's national electronic ticket operator, disrupting their train ticket service with a DDoS attack.
Snapshot from Hacker Council Global’s channel 

  • Threat actor Nonames claimed that from August 8th to the present, a coordinated cyberattack has been launched against Ukrainian websites, involving multiple hacktivist groups. A total of 111 resources associated with the Ukrainian government and various critical sectors were targeted out of which Nonames targeted 84 websites, aiming to disrupt the operations of what the attackers referred to as the "criminal regime of the terrorist Zelensky."
Snapshot from NoName channel 

Conclusion:

The ongoing cyberattacks on Ukraine by NoName057(16) and its allies pose a serious threat to the country's independence and security. These attacks have the potential to disrupt critical infrastructure, undermine the government's ability to function, and weaken Ukraine's economic resilience. The continued focus on vital sectors such as energy, transportation, and government services highlights the attackers' intent to cause maximum damage.

As Ukraine prepares to celebrate its Independence Day, these cyberattacks could pose a significant threat to the country's ability to commemorate this important national holiday. It is imperative that Ukraine strengthen its cybersecurity defenses and build resilience against these attacks to ensure a safe and successful Independence Day celebration.

Recommendations and Suggestions:

A comprehensive approach to bolstering your organization's cybersecurity posture, encompassing a multi-faceted strategy for prevention, detection, and response.

1. Elevate Cybersecurity Measures:

  • Proactive Threat Detection: Implement advanced systems to swiftly identify and neutralize ransomware attacks and other malicious activities.
  • Ongoing System Hardening: Regularly update and patch all systems to eliminate vulnerabilities exploited by cybercriminals.

2. Fortify Data Protection:

  • Data Fortress: Enforce stringent access controls and utilize encryption to safeguard sensitive data from unauthorized access and breaches.
  • Continuous Evaluation: Regularly conduct audits and vulnerability assessments to identify and address potential weaknesses in your data protection strategies.

3. Empower Your Workforce:

  • Cybersecurity Literacy: Equip employees with the knowledge and skills to recognize and respond effectively to phishing attempts, social engineering, and other cyber threats.
  • Preparedness is Key: Develop and regularly test incident response plans to ensure a swift and coordinated response to data breaches and cyberattacks.

4. Stay Ahead of the Threat Landscape:

  • Threat Intelligence: Continuously monitor underground forums and dark web activity for potential threats targeting your organization or industry.
  • Collaboration is Power: Partner with reputable cybersecurity companies like CloudSEK to gain insights into emerging threats and leverage their expertise for mitigation strategies.

5. Safeguarding Personal Data:

  • Data Privacy Shield: Implement robust data privacy measures to protect personally identifiable information (PII) from unauthorized access and misuse.
  • Compliance is Paramount: Ensure compliance with relevant data protection regulations and industry standards to safeguard personal and financial information.

6. Streamlined Incident Reporting and Communication:

  • Efficient Response: Establish clear protocols for reporting and managing data breaches and cyber incidents to minimize damage and expedite recovery efforts.
  • Transparency is Trust: Communicate openly with affected parties and stakeholders to maintain trust and provide guidance on mitigating the impact of data breaches.

References

CloudSEK’s flagship digital risk monitoring platform XVigil contains a module called “Underground Intelligence” which provides information about the latest Adversary, Malware, and Vulnerability Intelligence, gathered from a wide range of sources, across the surface web, deep web, and dark web.

Author

CloudSEK TRIAD

CloudSEK Threat Research and Information Analytics Division

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Adversary Intelligence

8

min read

Cyber Shadows Over Ukraine: An Independence Day Perspective

The article "Cyber Shadows Over Ukraine" highlights the increased cyber threats Ukraine faces around its Independence Day, particularly from groups like NoName and the Russian Cyber Army. These attacks, primarily targeting government and critical infrastructure, underscore the need for Ukraine to bolster its cybersecurity defenses to ensure the safety and resilience of its national systems during this vulnerable period

Authors
CloudSEK TRIAD
CloudSEK Threat Research and Information Analytics Division
Co-Authors
No items found.

Category: Adversary Intelligence

Region: Ukraine

TLP: GEEEN

Executive Summary

This report analyzes the evolving cyber threat landscape surrounding Ukraine's Independence Day (August 24th), holds profound national significance, especially in light of the country's ongoing conflict with Russia., This occasion could be a focal point for heightened tensions and vulnerabilities in the cyber domain. Ukraine experienced ongoing sophisticated cyberattacks targeting critical infrastructure, government institutions, and civil society, orchestrated by both state-sponsored and non-state actors. In the last three months 458 incidents of cyber attacks happened in Ukraine mostly consisting of DDOS followed by Defacement and Databreachs. ”NoName" is the most active group targeting Ukraine, responsible for 36% of attacks, making it a key player in the cyber threat landscape. The "Russian Cyber Army" follows closely, highlighting significant Russian involvement. Groups like Anonymous RUSSIA, Autodafe Internet, BLOODNET, Skillnet, 22C and RipperSec contribute to a diverse threat landscape. Other groups, including Sulawesi Cyber Team, CyberDragon, and Doubleface, also pose a risk, despite their lower activity levels.

Ukraine Cyber Threat Landscape: Industry Specific Insight

In Ukraine, cyber attacks have significantly impacted numerous industries, with over 482 incidents reported in the last three months. Various hacktivist groups have been behind these attacks, with Noname being the most active. These cyber assaults have affected a broad range of industries, causing substantial disruptions and financial losses.

The government sector is the primary target, facing nearly 50% of cyberattacks, indicating a focus on critical infrastructure and sensitive data. The technology and transportation sectors are also heavily impacted, each with over 10% of attacks, exposing vulnerabilities in essential services. Other industries, such as energy, media, and education, also face significant risks.

The chart below provides a detailed overview of the threat landscape, highlighting the specific industries in Ukraine that have been impacted by cyber attacks.

Ukraine Threat Landscape industry specific: Last three months statistics

Key Observations from the Chart:

  • Government Sector: The government sector is by far the most targeted, accounting for nearly 50% of cyberattacks. This suggests that critical infrastructure and sensitive information are prime targets for attackers.
  • Technology and Transportation: Following the government, technology and transportation sectors are also significantly impacted, each with over 10% of the total attacks. This highlights the vulnerability of essential services and supply chains to cyber threats.
  • Other Sectors: While the government, technology, and transportation sectors dominate the threat landscape, other industries like energy, media, and education also face a notable risk.

Top Hacktivist Groups Targeted Ukraine

  • NoName's Dominance: The most prominent group targeting Ukraine is "NoName," accounting for a substantial 36% of the attacks. This suggests that NoName is a significant player in the cyber threat landscape against Ukraine.
  • Russian Cyber Army: The "Russian Cyber Army" is the second most active group, indicating that Russian-affiliated entities are actively involved in cyberattacks against Ukraine.
  • Diverse Threat Actors: A wide range of other hacktivist groups, including Anonymous RUSSIA, Autodafe Internet, BLOODNET, Anonymous Guys , Skillnet and RipperSec, are also involved, suggesting a diverse threat landscape with various motivations and capabilities.
  • Smaller Groups: Several smaller groups, such as Sulawesi Cyber Team, CyberDragon, and Doubleface, account for relatively small percentages of the attacks, but their involvement still poses a threat to Ukraine's cybersecurity.
Top Hacktivist Groups targeted Ukraine

Ukraine Cyber Threat Landscape: Attacks Type Insight

Ukraine continues to face a diverse array of cyber attacks, including malware infections, data breaches, Distributed Denial of Service (DDoS) attacks, and website defacements. 

  • DDOS: Denial-of-Service (DDoS) attacks are the most prevalent type, accounting for a substantial 68.1% of the total attacks. This indicates that DDoS attacks are a significant threat to online systems and services.
  • Defacement: Defacement attacks, where attackers modify or alter the content of websites, constitute 21.7% of the attacks. This suggests that attackers are targeting websites for disruption or propaganda purposes.
  • Data Breach and Malware: Data breaches and malware attacks, while less frequent than DDoS and defacement, still pose significant risks. Data breaches can lead to sensitive information theft, and malware can compromise systems and networks.
  • Phishing: Phishing attacks, which attempt to trick individuals into disclosing personal information, are relatively rare, accounting for only 0.4% of the attacks. However, they can still be effective in compromising individual accounts and systems.

Ukraine Threat Landscape Attack method specific: Last three months statistics

Data Breaches: 

This part outlines recent major data breaches affecting Ukraine, focusing on the compromised databases of key institutions and government entities, along with the sale of sensitive personal information. These breaches emphasize the severe risks posed by unauthorized access to personal and financial data, including the potential for identity theft, financial fraud, and significant operational disruptions.

  • A threat actor known as dk0m posted on the underground forum, claiming to possess Ukrainian confidential data, including justice, court, country data, statistics, and exchange data. The actor is offering to sell the data via Telegram and has provided samples of the data. The post also contains a list of Ukrainian Justice Ministry contacts.
Ukraine Confidential Data available on Darkweb forum
  • An underground forum user named dk0m was selling access to a Ukrainian court account that provides the ability to apply to various law enforcement agencies. The user has provided samples of court documents obtained using the account. The price for the account is determined through private messages.  (2024-08-17)
Threat actor selling Ukraine court account with law enforcement data on Dark Web forum

  • A threat actor known as EmailBroker was offering to sell a collection of Ukraine Cyber Police and Government emails on the underground forum. The actor claims to possess a database containing sensitive information and is seeking potential buyers. The actor encourages interested parties to contact them directly on the forum, and escrow is accepted as a payment method.

Threat actor selling  Ukraine Cyber Police and Government emails data on Dark Web forum

  • A threat actor known as Yua8186 posted on the underground forum, claiming to possess a massive database containing personal information of 56 million Ukraine residents. The actor has provided links to eight cloud storage files containing the data. The data is said to include names, addresses, phone numbers, and email addresses of Ukrainian citizens.

Threat actor posted 56 million Ukraine residents data on Dark Web forum

  • A threat actor known as Hoover posted on the underground forum Breach Forums, claiming to possess a 1.01 GB SQL database containing customer information from parfumcity.com.ua. The actor is offering to sell the data for an undisclosed price. The database reportedly contains sensitive information such as names, addresses, phone numbers, email addresses, and order details.
Threat actor posted 1.01 GB SQL database containing customer information from parfumcity.com.ua on Dark Web forum

DDOS: 

Ukraine is heavily impacted by Distributed Denial-of-Service (DDoS) attacks, which make up 68.1% of all cyberattacks. This highlights DDoS as a major threat, severely disrupting online systems and services in the country. 

Trend Analysis:

  • Early June to Mid-June (June 1 - June 15): There is a steady number of attacks, ranging mostly between 4 to 8 incidents per day, indicating a moderate but consistent level of threat.
  • Mid-June to End of June (June 16 - June 30): A spike in activity is observed around June 22, with a peak of around 11 incidents. This period is characterized by heightened activity compared to early June, likely indicating coordinated attack campaigns.
  • Early July to Mid-July (July 1 - July 15): A significant drop in activity is observed, with several days showing minimal or no attacks. This suggests a temporary decline in the threat level, which could be due to several factors such as defensive measures by Ukraine or a strategic pause by the attackers.
  • Mid-July to Early August (July 16 - August 5): The number of incidents begins to rise again, although the intensity remains lower compared to late June. This period shows a gradual increase, indicating a resurgence in DDoS activity.
  • Early August to Mid-August (August 6 - August 15): A sharp increase in incidents is seen, with the number of daily attacks surging past 20 on multiple days. This represents the most intense period of DDoS activity within the timeline, suggesting a highly aggressive cyber campaign against Ukraine.
  • Mid-August to Late August (August 16 - August 22): Although there is a slight decrease compared to the peak in early August, the threat level remains high with around 10-15 incidents daily. This indicates sustained pressure on Ukrainian infrastructure.
DDOS Timeline in Ukraine

Major DDOS Attacks:

  • Anonymous guys have targeted multiple critical infrastructure websites in Ukraine, including the Shipping & Ports Authority, Government Contact Center, Ministry of Infrastructure, Railways Authority, and the Cabinet of Ministers' websites.
Snapshot from Anonymous guy telegram channel 

  • NoName has targeted multiple Telecom service providers (TSP) in Ukraine.
Snapshot from Noname’s telegram channel 

  • The Hacker Council Global targeted Ukraine's national electronic ticket operator, disrupting their train ticket service with a DDoS attack.
Snapshot from Hacker Council Global’s channel 

  • Threat actor Nonames claimed that from August 8th to the present, a coordinated cyberattack has been launched against Ukrainian websites, involving multiple hacktivist groups. A total of 111 resources associated with the Ukrainian government and various critical sectors were targeted out of which Nonames targeted 84 websites, aiming to disrupt the operations of what the attackers referred to as the "criminal regime of the terrorist Zelensky."
Snapshot from NoName channel 

Conclusion:

The ongoing cyberattacks on Ukraine by NoName057(16) and its allies pose a serious threat to the country's independence and security. These attacks have the potential to disrupt critical infrastructure, undermine the government's ability to function, and weaken Ukraine's economic resilience. The continued focus on vital sectors such as energy, transportation, and government services highlights the attackers' intent to cause maximum damage.

As Ukraine prepares to celebrate its Independence Day, these cyberattacks could pose a significant threat to the country's ability to commemorate this important national holiday. It is imperative that Ukraine strengthen its cybersecurity defenses and build resilience against these attacks to ensure a safe and successful Independence Day celebration.

Recommendations and Suggestions:

A comprehensive approach to bolstering your organization's cybersecurity posture, encompassing a multi-faceted strategy for prevention, detection, and response.

1. Elevate Cybersecurity Measures:

  • Proactive Threat Detection: Implement advanced systems to swiftly identify and neutralize ransomware attacks and other malicious activities.
  • Ongoing System Hardening: Regularly update and patch all systems to eliminate vulnerabilities exploited by cybercriminals.

2. Fortify Data Protection:

  • Data Fortress: Enforce stringent access controls and utilize encryption to safeguard sensitive data from unauthorized access and breaches.
  • Continuous Evaluation: Regularly conduct audits and vulnerability assessments to identify and address potential weaknesses in your data protection strategies.

3. Empower Your Workforce:

  • Cybersecurity Literacy: Equip employees with the knowledge and skills to recognize and respond effectively to phishing attempts, social engineering, and other cyber threats.
  • Preparedness is Key: Develop and regularly test incident response plans to ensure a swift and coordinated response to data breaches and cyberattacks.

4. Stay Ahead of the Threat Landscape:

  • Threat Intelligence: Continuously monitor underground forums and dark web activity for potential threats targeting your organization or industry.
  • Collaboration is Power: Partner with reputable cybersecurity companies like CloudSEK to gain insights into emerging threats and leverage their expertise for mitigation strategies.

5. Safeguarding Personal Data:

  • Data Privacy Shield: Implement robust data privacy measures to protect personally identifiable information (PII) from unauthorized access and misuse.
  • Compliance is Paramount: Ensure compliance with relevant data protection regulations and industry standards to safeguard personal and financial information.

6. Streamlined Incident Reporting and Communication:

  • Efficient Response: Establish clear protocols for reporting and managing data breaches and cyber incidents to minimize damage and expedite recovery efforts.
  • Transparency is Trust: Communicate openly with affected parties and stakeholders to maintain trust and provide guidance on mitigating the impact of data breaches.

References

CloudSEK’s flagship digital risk monitoring platform XVigil contains a module called “Underground Intelligence” which provides information about the latest Adversary, Malware, and Vulnerability Intelligence, gathered from a wide range of sources, across the surface web, deep web, and dark web.