Tag: ukraine
-
State-affiliated hackers set up for critical OT attacks that operators may not detect
Tags: access, antivirus, attack, conference, control, credentials, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, firmware, fortinet, group, hacker, incident response, infrastructure, Internet, Intruder, lessons-learned, malware, mfa, monitoring, network, password, penetration-testing, phishing, regulation, russia, service, spear-phishing, supply-chain, threat, tool, ukraine, update, vulnerabilityRussia’s OT attack teams expand beyond Ukraine: The Russia-linked pair Kamacite and Electrum, which Dragos has tracked since the mid-2010s and is responsible for the 2015 and 2016 cyberattacks that took down parts of Ukraine’s power grid, expanded operations into NATO territory in 2025 after years focused almost exclusively on Ukrainian targets.Kamacite, which serves as…
-
State-affiliated hackers set up for critical OT attacks that operators may not detect
Tags: access, antivirus, attack, conference, control, credentials, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, firmware, fortinet, group, hacker, incident response, infrastructure, Internet, Intruder, lessons-learned, malware, mfa, monitoring, network, password, penetration-testing, phishing, regulation, russia, service, spear-phishing, supply-chain, threat, tool, ukraine, update, vulnerabilityRussia’s OT attack teams expand beyond Ukraine: The Russia-linked pair Kamacite and Electrum, which Dragos has tracked since the mid-2010s and is responsible for the 2015 and 2016 cyberattacks that took down parts of Ukraine’s power grid, expanded operations into NATO territory in 2025 after years focused almost exclusively on Ukrainian targets.Kamacite, which serves as…
-
BadPaw and MeowMeow: Russian Cyber Offensive Targets Ukraine with Novel Malware Duo
The post BadPaw and MeowMeow: Russian Cyber Offensive Targets Ukraine with Novel Malware Duo appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/badpaw-and-meowmeow-russian-cyber-offensive-targets-ukraine-with-novel-malware-duo/
-
BadPaw and MeowMeow: Russian Cyber Offensive Targets Ukraine with Novel Malware Duo
The post BadPaw and MeowMeow: Russian Cyber Offensive Targets Ukraine with Novel Malware Duo appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/badpaw-and-meowmeow-russian-cyber-offensive-targets-ukraine-with-novel-malware-duo/
-
Russian hackers deploy new malware in phishing campaign targeting Ukraine
Researchers have identified a suspected Russian espionage campaign targeting Ukraine that uses two previously undocumented malware strains. First seen on therecord.media Jump to article: therecord.media/russian-ukraine-hackers-malware
-
Multi-Stage BadPaw Malware Campaign Targets Ukraine
Malware campaign uses Ukrainian email service for credibility, deploying BadPaw to execute attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/badpaw-malware-targets-ukraine/
-
Epic Fury introduces new layer of enterprise risk
Tags: access, apt, attack, business, cisa, ciso, communications, country, credentials, cyber, cybersecurity, data-breach, disinformation, exploit, group, infrastructure, intelligence, international, Internet, iran, malware, middle-east, network, ransomware, resilience, risk, rust, service, software, technology, tool, ukrainePhysical attacks on US-linked locations through direct action or partner groups. We are already seeing Iranian missile launches into a variety of nations in the region.Cyber operations that include disruptive activity, targeted intrusions, credential and access harvesting, destructive malware deployment, and the use of compromised infrastructure to support broader influence or operational objectives.Proxy networks across…
-
Ukrainian hacker pleads guilty to running OnlyFake AI ID scam site
Ukrainian citizen Yurii Nazarenko admitted running OnlyFake, an AI-driven site that sold over 10,000 fake IDs worldwide. Ukrainian man Yurii Nazarenko pleaded guilty to operating OnlyFake, an AI-powered site that generated and sold more than 10,000 counterfeit IDs globally. >>United States Attorney for the Southern District of New York, Jay Clayton, and Assistant Director in Charge…
-
Ukrainian man pleads guilty to running AI-powered fake ID site
A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000 photos of fake identification documents to customers worldwide. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site/
-
Ukraine pushes tighter Telegram regulation, citing Russian recruitment of locals
Protecting Ukrainian national security will probably require restrictions on Telegram and other anonymous online platforms as Russia continues to use them to organize sabotage and terrorism, officials said. First seen on therecord.media Jump to article: therecord.media/ukraine-telegram-regulation-russia-sabotage-recruitment
-
Ukraine says cyberattacks on energy grid now used to guide missile strikes
Russian cyberattacks targeting Ukraine’s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, Ukrainian cybersecurity officials said. First seen on therecord.media Jump to article: therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes
-
Ukrainian national gets 5-year sentence for involvement in North Korea IT worker scheme
A Ukrainian man was sentenced to five years in U.S. prison for his years-long role in a scheme that helped North Koreans get illegally hired in IT roles at 40 American companies. First seen on therecord.media Jump to article: therecord.media/north-korea-laptop-farm-ukraine
-
Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies
A Ukrainian man has been sentenced for helping North Koreans gain fraudulent employment at dozens of U.S. companies and funnel that money back to the regime to fund its nuclear weapons program. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/20/ukrainian-man-jailed-for-identity-theft-that-helped-north-koreans-get-jobs-at-us-companies/
-
Ukrainian gets five years for helping North Koreans secure US tech jobs
Polish arrest leads to extradition and federal prison sentence First seen on theregister.com Jump to article: www.theregister.com/2026/02/20/north_korean_it_worker_prison/
-
North Korean IT worker scam nets Ukrainian five-year sentence in the U.S.
A Ukrainian man was sentenced to five years in the U.S. for helping North Korean IT workers use stolen identities to get hired by U.S. firms. Oleksandr “Alexander” Didenko, a 29-year-old Ukrainian national, has been sentenced to five years in a U.S. prison for supporting North Korea’s fraudulent IT worker scheme. Didenko admitted stealing U.S.…
-
Hackers breach contractor linked to Ukraine’s central bank collectible coin store
The National Bank of Ukraine announced that attackers may have gained access to users’ personal data, including names, phone numbers, email addresses and delivery addresses, in a recent cyberattack. First seen on therecord.media Jump to article: therecord.media/hackers-breach-ukraine-national-bank-contractor
-
Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea’s fraudulent information technology (IT) worker scheme.In November 2025, Oleksandr “Alexander” Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing the identities of U.S. citizens and selling them to IT…
-
Man gets five years for aiding North Korean IT employment scam
Ukrainian national Oleksandr Didenko, 29, was sentenced in U.S. District Court to 5 years in prison for an identity theft scheme that enabled North Korean workers to secure … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/20/ukrainian-national-sentenced-id-entity-theft-north-korea-it-workers-identity-theft/
-
Ukrainian gets 5 years for helping North Koreans infiltrate US firms
A Ukrainian national was sentenced to five years in prison for providing North Korean IT workers with stolen identities that helped them infiltrate U.S. companies. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms/
-
Ukrainian sentenced to 5 years in prison for facilitating North Korean remote worker scheme
Oleksandr Didenko ran laptop farms and provided forged or stolen identities to North Korean operatives who gained remote employment at 40 U.S. businesses. First seen on cyberscoop.com Jump to article: cyberscoop.com/doj-ukrainian-north-korea-remote-worker-scheme-facilitator-sentenced/
-
Public mobile networks are being weaponized for combat drone operations
On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100 drones … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/19/enea-mobile-connected-drones-report/
-
Public mobile networks are being weaponized for combat drone operations
On June 1, 2025, Ukraine launched a coordinated drone strike on five airfields inside Russia, disabling or destroying aircrafts. The attack involved more than 100 drones … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/19/enea-mobile-connected-drones-report/
-
Notepad++ author says fixes make update mechanism ‘effectively unexploitable’
Tags: access, attack, backdoor, china, control, credentials, dns, espionage, exploit, group, infrastructure, intelligence, malicious, monitoring, network, risk, risk-management, service, software, supply-chain, threat, ukraine, update, vulnerabilityCSOonline, Ho said that no system can ever be declared absolutely unbreakable, “but the new design dramatically raises the bar.”An attacker must now compromise both the hosting infrastructure and the signing keys, he explained, adding that the updater now validates both the manifest and the installer, each with independent cryptographic signatures. And any mismatch, missing…
-
Newly identified hacking groups provide access to OT environments
A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/new-hacking-groups-access-ot-environments/812323/
-
Starlink restrictions hit Russian forces as Moscow seeks workarounds
Ukraine’s security service said Russia was trying to recruit locals to help restore access to blocked Starlink satellite internet terminals. First seen on therecord.media Jump to article: therecord.media/starlink-restrictions-hit-russian-forces
-
Welche Länder sabotieren die Russen bevorzugt?
In Deutschland fanden seit Beginn des Ukraine-Kriegs bis Ende 2024 die meisten Angriffe auf kritische Infrastruktur statt. Das ist ein Ergebnis einer Erhebung des Londoner Thinktanks International Institute for Strategic Studies (IISS [1]). Demzufolge gab es in Deutschland 12 physischen Angriffe auf Objekte, Dienste oder Personen. Es folgen Frankreich (11 Angriffe) und Polen (8 Angriffe)….…
-
Suspected Russian hackers deploy CANFAIL malware against Ukraine
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware. Google Threat Intelligence Group identified a previously undocumented threat actor behind attacks on Ukrainian organizations using CANFAIL malware. The group is possibly linked to Russian intelligence services and has targeted defense, military, government, and energy entities at both regional…
-
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL.Google Threat Intelligence Group (GTIG) described the hack group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and First seen on…
-
Europe must adapt to ‘permanent’ cyber and hybrid threats, Sweden warns
Cyber and hybrid threats are now a permanent feature of Europe’s security environment, a senior Swedish defense official said, citing Russia’s full-scale invasion of Ukraine as a turning point. First seen on therecord.media Jump to article: therecord.media/sweden-cyber-threats-europe-permanent

