Many of us are unwillingly forced to take part in the Russia-Ukraine conflict, and while we can’t make an impact on the physical warfare, we should be proactive in defending our organizations from cyberattacks, and actively train our employees to do the same
Bad actors are well known for pursuing every opportunity, especially global events – as a vehicle to launch attacks, such as phishing emails, data breaches, and ransomware. More recently, we see a concerning spike in complex, malicious attacks originating from the conflict in Russia.
Outside of physical warfare, both Russia and Ukraine have been involved in a dedicated program of cyberwarfare. Participants in the conflict have launched cyberattacks on each other with entities supportive of Russia involved in data-wiping malware and taking websites offline with DoS attacks to prevent their use. Additionally, there have been malicious phishing-borne ransomware attacks and a range of other threats casting a sinister shadow that threatens every organization. These attacks are not always contained and often infect devices and websites that are not involved in the conflict. This includes corporate and personal devices as well. Employee social media accounts are also at risk of being hacked for the purpose of distributing false information or malware. With the Ukraine conflict surging, these attacks are expected to intensify with nearly everyone at risk of suffering the consequences of a sudden attack.
If an email is received regarding the crisis that mentions interesting wartime footage or that points the reader to unknown websites where supposedly interesting content is hosted, there is a good chance it is a phishing email. If it requests assistance and it seems legitimate, make sure not to click on the link. Instead, google the organization and use the company’s legitimate website.
In such turbulent times, regard all emails that are Russia-Ukraine focused as suspicious and double-check the sender’s address. Beware of requests that ask for technical assistance such as running software or helping to take down websites. These might not only be illegal but may also be used to hack systems on the corporate network. Try to remember that during times of crisis, there is an increase in phishing attempts of all kinds as hackers take advantage of the situation. In this circumstance, employees need to stay updated from both a news and computing perspective.
To be proactive in the defense of computing environments, our security experts recommend:
“In addition to the above actions, creating a culture of security throughout an organization is especially critical in situations where the volume of malicious cyber activity is at record levels,” said Mike Polatsekis the Co-founder and Chief Strategy Officerfor CybeReady. “This can be done through in-person or group training sessions or through cybersecurity training platforms that are now in widespread use to expedite and support a more security-aware employee base.”
Incorporate phishing training that includes behavioral adaptive simulation and deploy an automated solution that has been developed by experts in the email security space. Run an effective solution that does not interfere with other critical actions so that operations remain free of unnecessary problems. Additionally, provide employees with an empowering training experience which is possible with today’s more advanced training platforms.
Security executives are also advised to run an effective, automated security awareness program that requires little effort to manage and achieves fast results. This includes managing a people-centric program that adapts to one’s needs, driving a positive, engaging, security culture awareness program 24x7x365 and meets security awareness training compliance standards through focused training and testing. Finally, consider implementing regular security and compliance KPIs by preparing for cybersecurity training in ways that are easy, effective, and effortless. Schedule mandatory security training and reminders to all employees without haste and finally, track training completion by completing progress reports that provide multiple views of today’s corporate environment.
Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from the Indonesian…
IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating system…
The Apache Software Foundation has issued a security alert regarding a critical vulnerability in Apache…
The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber espionage…
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…