The cybersecurity researchers at Microsoft have recently reported that on the websites of some Ukrainian organizations and government agencies, hackers are constantly attacking with malicious software and malware.
It has been noted that the malicious software used looks like ransomware, but without a ransom mechanism. In short, it is used by the attackers to disrupt the affected systems only, not to demand any ransom payments.
While since January 13 Microsoft has recorded similar software and malware on dozens of systems. However, till now in the group that is behind these attacks, there is no substantial overlap between the unique characteristics has been detected.
But, Microsoft has confirmed that they are still continuing their investigation and tracking each activity.
Due to these attacks and malware, several organizations were affected and here they are:-
Here’ what Microsoft stated:-
“We are aware of current geopolitical developments in Ukraine and other regions. But, we have also notified each of the impacted organizations we have identified so far, partnered with other cybersecurity providers to share what we know, and notified appropriate government agencies in the United States and elsewhere.”
But, Microsoft has already alerted all the affected organizations, and strongly recommended them to execute a brief investigation of the incident. As of now, there are no accusations or speculation have been confirmed about who is behind these attacks.
Moreover, after identifying this malware Microsoft has promptly deployed all the necessary protections into the following products:-
While so far there no such trace has been detected or reported about the exploitation of this vulnerability in the products and services of Microsoft.
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…