Since the wake of the war in 2022, Ukraine has studied and identified 3.000-plu cyber incidents that target its country’s infrastructure.
The Computer Emergency Response Team of Ukraine (CERT-UA) under the State Special Communications Service of Ukraine (SSSCIP) released a report that details the types of incidents they’ve detected so far, as well as provides some advice and a warning for other countrys’ cybersecurity departments.
“A lot of critical infrastructure facilities of Ukraine are targeted by enemy hackers, who never give up attempts to leave Ukrainians without vital services,” it reads before outlining what’s been going on in Ukraine’s digital war front.
Unfortunately, while Ukraine manages the war with Russia, its also suffering through frequent cyber attacks on every major part of its infrastructure — over 670 of these incidents focused on gathering information on various public sectors. Another 600-plus were intrusions to various networks.
Finance, local authorities, telecommunications, and energetics sections have all faced over a hundred attacks each, while public and local authorities combined have faced a staggering 570-plus attacks on their key infrastructure.
“This is why improving our own protection is essential for everyone, from a top manager to an intern, from water suppliers to local government departments,” the report read.
They advise that governments around the world remember that hackers are constantly updating their toolkits to be the best available and that everyone needs to constantly update their security and documenting processes, and run frequent simulations to stay on top of things.
“The SSSCIP reminds that even those organizations whose protection is designed according to the best standards must constantly re-evaluate their risks,” the report said.“Today, we all should understand that attacks against IT infrastructure can continue for years even after the conventional war is over.”
“Today, we all should understand that attacks against IT infrastructure can continue for years even after the conventional war is over. Russian hackers are still infiltrating into critical infrastructure networks through their managers’ devices (due to the use of unlicensed software) as well as through the devices of IT administrators who believed they were secure, and even through trusted relationships with suppliers, including software developers’ corporate networks.”