Tag: ukraine
-
AI-Powered Drones: Ukraine’s Historic Strikes on Russian Aircraft
Ukraine’s AI-powered FPV drones redefine warfare, featuring advancements in military technology and cost-effective strategies. Learn more! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/ai-powered-drones-ukraines-historic-strikes-on-russian-aircraft/
-
DDoS incident disrupts internet for thousands in Moscow
Russian internet service provider ASVT blamed widespread outages on a DDoS incident and attributed it to a pro-Ukraine collective. First seen on therecord.media Jump to article: therecord.media/moscow-internet-provider-asvt-ddos-attack
-
Void Blizzard nimmt NATO-Organisationen ins Visier
Tags: access, api, authentication, blizzard, cloud, cyberattack, cyberespionage, edr, fido, framework, governance, government, hacker, intelligence, mail, malware, mfa, microsoft, open-source, passkey, password, phishing, risk, siem, spear-phishing, threat, tool, ukraineRussische Hacker ändern ihre Taktik von Passwort-Spraying zu Phishing, aber ihre Ziele innerhalb der NATO bleiben gleich.Seit über einem Jahr hat es eine neue Cyberspionage-Gruppe, die mit der russischen Regierung in Verbindung stehen soll, auf Unternehmen aus verschiedenen Branchen innerhalb der NATO abgesehen. Die Gruppe wird von Microsoft Threat Intelligence ‘Void Blizzard” genannt. Die niederländischen…
-
The UK wants you to sign up for £1B cyber defense force
War in Ukraine causes major rethink in policy and spending First seen on theregister.com Jump to article: www.theregister.com/2025/05/30/uk_cyber_defense/
-
Staatlich unterstützte Hackergruppe TA406 – Nordkoreanische Cyberspionage in der Ukraine
First seen on security-insider.de Jump to article: www.security-insider.de/nordkorea-cyberangriffe-ukraine-hackergruppe-ta406-a-6caace65608b32dd6fc70ce3ca08621c/
-
Russian APT28 Hackers Attacking NATO-aligned Organizations to Steal Sensitive Data
Russia’s GRU-backed APT28, widely known as Fancy Bear, has intensified its cyber espionage campaign against NATO-aligned organizations. Active since at least 2007, this notorious threat actor has been attributed to a series of sophisticated attacks targeting critical infrastructure, government entities, and logistics firms across the United States, United Kingdom, Germany, Canada, Poland, Ukraine, and other…
-
Ukraine detains alleged Russian spies who used dash cams to guide missile strikes
The suspects allegedly parked cars with activated dash cams near military targets and left them to record for up to 12 hours. First seen on therecord.media Jump to article: therecord.media/ukraine-detains-russian-spies-using-dashcams-missile-strikes
-
Ukraine tallies up Russian cyberattacks on local media since start of war
Ukraine’s SSSCIP agency said Russia has been responsible for more than 200 incidents against media outlets since the start of the war, including wiper attacks, DDoS incidents and disinformation campaigns. First seen on therecord.media Jump to article: therecord.media/ukraine-media-cyberattacks-russia-ssscip-report
-
Russian IT pro sentenced to 14 years forced labor for sharing medical data with Ukraine
The latest in a long line of techies to face Putin’s wrath First seen on theregister.com Jump to article: www.theregister.com/2025/05/28/russian_it_pro_sentenced_to/
-
Void Blizzard: New Russian Cyberespionage Group Targets NATO and Ukraine
Microsoft Threat Intelligence has identified a cyberespionage campaign by a newly recognized Russia-affiliated actor named Void Blizzard, also First seen on securityonline.info Jump to article: securityonline.info/void-blizzard-new-russian-cyberespionage-group-targets-nato-and-ukraine/
-
Russian hospital programmer gets 14 years for leaking soldier data to Ukraine
A Russian court sentenced a former hospital programmer to 14 years in a high-security penal colony for allegedly leaking personal data of Russian soldiers to Ukraine, authorities said. First seen on therecord.media Jump to article: therecord.media/russian-programmer-gets-14-years-for-leaking-info-to-ukraine
-
The US Is Building a One-Stop Shop for Buying Your Data
Plus: A mysterious hacking group’s secret client is exposed, Signal takes a swipe at Microsoft Recall, Russian hackers target security cameras to spy on aid to Ukraine, and more. First seen on wired.com Jump to article: www.wired.com/story/us-spies-one-stop-shop-private-data/
-
Russian Hackers Target Western Firms Aiding Ukraine, Spy on Shipments
Russian military hackers are targeting Western firms aiding Ukraine, using cyberespionage to infiltrate logistics networks and spy on arms shipments. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/russian-hackers-target-western-firms/
-
Operation Endgame 2.0: DanaBusted
Tags: access, attack, backup, banking, breach, business, cloud, communications, control, crypto, cybercrime, data, defense, detection, email, espionage, firewall, fraud, government, group, Hardware, infection, intelligence, international, law, malicious, malware, middle-east, network, programming, ransomware, russia, service, supply-chain, switch, threat, tool, ukraine, update, windowsIntroductionOn May 22, 2025, international law enforcement agencies released information about additional actions that were taken in conjunction with Operation Endgame, an ongoing, coordinated effort to dismantle and prosecute cybercriminal organizations, including those behind DanaBot. This action mirrors the original Operation Endgame, launched in May 2024, which disrupted SmokeLoader, IcedID, SystemBC, Pikabot, and Bumblebee. Zscaler…
-
Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine
Tags: access, advisory, api, authentication, cctv, cloud, computer, container, credentials, cve, cybersecurity, data, detection, email, exploit, flaw, government, hacker, identity, infrastructure, Internet, login, malicious, malware, mfa, military, network, ntlm, office, open-source, password, phishing, powershell, russia, service, software, threat, tool, ukraine, vulnerabilityCredential guessing and spearphishing: The attackers used brute-force credential guessing techniques, also known as password spraying, to gain initial access to accounts. This was complemented with targeted phishing emails that directed recipients to fake login pages for government entities or Western cloud email providers. These phishing pages were stored on free web hosting services or…
-
Breach Roundup: US Indicts Qakbot Malware Leader
Also: Signal Blocks Recall, Europe Sanctions Stark Industries. This week, Qakbot leader indicted, Signal blocked Recall and a judge said Trump illegally removed watchdogs. Ivanti and Palo Alto hacks linked, Stark Industries sanctioned, Marks and Spencer’s hack costs 300M pounds. Pro-Ukraine hackers hit a Russian clinic and an outbreak of PureRAT in Russia. First seen…
-
Russian Threat Actor TAG-110 Goes Phishing in Tajikistan
While Ukraine remains Russia’s major target for cyberattacks, TAG-110 is part of a strategy to preserve a post-Soviet sphere of influence by embedding itself in other countries’ infrastructures. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/russian-threat-actor-tag-110-phishing-tajikistan
-
Russian hackers targeting Western logistics, tech support of Ukraine
First seen on scworld.com Jump to article: www.scworld.com/news/russian-hackers-targeting-western-logistics-tech-support-of-ukraine
-
Russian hacker group Killnet returns with new identity
Earlier this month, Killnet claimed it had hacked Ukraine’s drone-tracking system after disappearing from public view in 2023. First seen on therecord.media Jump to article: therecord.media/russian-hacker-group-killnet-returns-with-new-identity
-
Russische Cyber-Kampagne in Nato-Staaten aufgedeckt
Westliche Geheimdienste haben eine Cyber-Kampagne Russlands aufgedeckt, die gegen logistische und technologische Ziele in Nato-Staaten gerichtet ist. Wie das britische National Cyber Security Centre mitteilte, soll die Einheit 26165 des russischen Geheimdienstes GRU seit 2022 eine Kampagne gegen staatliche und private Organisationen durchgeführt haben. Dabei sollen auch solche ins Visier geraten sein, die mit der Koordination…
-
Russia-linked APT28 targets western logistics entities and technology firms
CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing an elevated threat to supply chains Russia-linked cyberespionage group APT28 intensifies its operations against Western logistics and technology companies moving supplies into Ukraine, US CISA warns. TheAPT28group (akaFancy Bear,Pawn Storm,Sofacy Group,Sednit,BlueDelta, andSTRONTIUM)has been active since at least 2007 and it…
-
Behörden warnen: Russische Hacker bei Spionage über IP-Kameras erwischt
Dem russischen Militär zugeordnete Hacker haben es wohl auf Hilfslieferungen an die Ukraine abgesehen. Tausende IP-Kameras wurden infiltriert. First seen on golem.de Jump to article: www.golem.de/news/behoerden-warnen-russische-hacker-bei-spionage-ueber-ip-kameras-erwischt-2505-196449.html
-
Russian hackers breach orgs to track aid routes to Ukraine
A Russian state-sponsored cyberespionage campaign attributed to APT28 (Fancy Bear/Forest Blizzard) hackers has been targeting and compromising international organizations since 2022 to disrupt aid efforts to Ukraine. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russian-hackers-breach-orgs-to-track-aid-routes-to-ukraine/
-
Russia’s Fancy Bear swipes a paw at logistics, transport orgs’ email servers
Their connection? Aiding Ukraine, duh First seen on theregister.com Jump to article: www.theregister.com/2025/05/21/russias_fancy_bear_alert/
-
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
Tags: cyber, email, exploit, hacker, intelligence, military, russia, service, spy, technology, threat, ukraine, vpn, vulnerabilityRussian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022.The activity has been assessed to be orchestrated by APT28 (aka BlueDelta, Fancy Bear, or Forest Blizzard), which is linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center, Military Unit…
-
Russia stepping up attacks on firms aiding Ukraine, Western nations warn
One of Moscow’s most infamous hacker teams is targeting logistics and technology companies supporting Kyiv’s war effort. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/russia-hacking-ukraine-aid-logistics-tech-companies-advisory/748723/
-
Russian GRU’s APT28 Targets Global Logistics Supporting Ukraine Defense
A new Joint Cybersecurity Advisory issued in May 2025 by a coalition of cybersecurity and intelligence agencies across First seen on securityonline.info Jump to article: securityonline.info/russian-grus-apt28-targets-global-logistics-supporting-ukraine-defense/
-
Teil der russischen Strategie – Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
First seen on security-insider.de Jump to article: www.security-insider.de/russische-hackergruppe-fancy-bear-cyberspionage-ruestungsfirmen-a-654fe3a1c212a30b34d2081a5be50e42/
-
Nation-state APTs ramp up attacks on Ukraine and the EU
Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/21/apt-groups-attacks-eu-ukraine/

