Russian hackers have intensified attacks on the mobile devices of Ukrainian military personnel - State Special Communications Service research. Russian hackers have increased the number of cyberattacks on the mobile devices of Ukrainian military personnel. In the second half of 2023, hackers associated with the GRU of the Russian Federation actively used messengers and social engineering to spread malware. The analytical report "Russian Cyber Operations" H2 '2023 prepared in English by experts from the government's Computer Emergency Response Team of Ukraine (CERT-UA) is here: https://lnkd.in/d3YT-DNg Key points in attacks on mobile devices: ▪️ Use of legitimate products as camouflage: hackers disguised spyware as installers of legitimate programs, such as the "Kropyva" situational awareness system. ▪️ Spread of malware through Signal and Telegram: criminals used these messengers to distribute malicious files, disguising them as cybersecurity instructions from CERT-UA. ▪️ Swift reaction and adaptation: hackers quickly responded to new defense methods and developed new attack vectors. ▪️ Targeting Windows software: most messenger-based attacks aimed to spread malware for Windows, as many military personnel use computer versions of messengers. ▪️ Use of bait files: criminals distributed malware in the form of zip or rar archives, disguising them as certificate updates for the Delta situational awareness complex.
Raisa Fedorovska’s Post
More Relevant Posts
-
I was honored to speak at the Payment and Credit Security Forum organized by Ukrainian Interbank Payment Systems Member Association "EMA". The presentation that captivated me the most, as always, was by Yuriy Khmelenko from SenseBank, titled "Minimizing Risks of Unauthorized Payment Card Tokenization". Another engaging presentation was by Oleksiy Duminyuk from Visa on acquiring risk management – it brought back memories from my early career). My presentation focused on the risks posed by artificial intelligence, fraudulent affiliate programs, targeted fraud, cloaking technology, and the new fraud schemes emerging on fraudulent forums. I was glad to see old friends in person, which made the event more special.
-
-
-
-
-
+2
To view or add a comment, sign in
-
-
Excited to share some slides from my recent presentation at the PAYMENTS & SECURITY EMA CONFERENCE. I delved into the pressing issue of Crime-as-a-Service. The timeliness of this topic couldn't be more evident, especially given recent events. Just in April, a global police operation dismantled a notorious 'cybercrime-as-a-service' platform, known as LabHost, that facilitated the sale of phishing kits, hosting infrastructure, interactive victim engagement tools, and campaign overview services to its 10,000 users across the globe. With a monthly fee averaging $249, LabHost offered a range of illicit services which were customisable and could be deployed with a few clicks. And just a day before the conference, Ukrainian Cyberpolice shut down a fraudulent call center in Odesa. The center had defrauded citizens of the Czech Republic, illustrating the stark reality of the Scam-as-a-Service business model and its transnational reach. My presentation delved into practical issues and illustrated examples that underscored the complexity of modern scams. It highlighted how contemporary scams transcend simple criminal activities, evolving into sophisticated and meticulously organized operations. I'm honored that my presentation was recognized as one of the standout sessions at the conference. It's crucial to collaborate and innovate to stay ahead of cybercriminals in safeguarding businesses and consumers.
-
-
-
-
-
+12
To view or add a comment, sign in
-
-
The Telegram messaging app has restored access to chatbots used by Ukraine's security services and intelligence agencies to collect data about Russian military activity after they were temporarily blocked. For our international colleagues: Ukraine's security services and intelligence agencies rely on Telegram chatbots, such as 'e-vorog,' to gather critical data on Russia's military activities, including troop movements and artillery locations. After being temporarily blocked, access to these bots has been reinstated, allowing intelligence gathering operations to resume and providing vital real-time information regarding russian drone and missile strikes as well as military equipment movements. Ukraine's military intelligence (GUR) is pleased. However, isn't it a bit naïve to continue gathering information on a platform controlled by russia, with russian origins? Why not use WhatsApp or Viber? They also offer channels. Apologies for the emotion, but there are many. This isn't just about cybersecurity; it's about common sense.
To view or add a comment, sign in
-
-
Despite undergoing surgery, I'm excited to announce that I will still be speaking at the PAYMENTS & SECURITY EMA CONFERENCE. This prestigious conference is celebrating its 24th edition. A highlight of this year's event is the grand celebration of the 25th anniversary of the EMA Association, established in 1999. Throughout its existence, the association has provided unwavering support to the Ukrainian banking and payment industry. I'm grateful for the opportunity to be a part of this milestone occasion and share insights from my nearly completed presentation. Looking forward to connecting and collaborating at the conference. See you there!
To view or add a comment, sign in
-
-
I am honored to have been invited to the webinar for professionals from the Investigation, Criminal Police, Cyberpolice, and Prosecution of the Zaporizhya region. Half of the participants joined in person in Dnipro, while the other half connected remotely from the shelter in Zaporizhya. The webinar delved into current challenges and strategies in investigating payment fraud. During the webinar part I conducted, I provided a comprehensive overview of current online fraud technologies, schemes, tools, and infrastructure. I'm grateful for the opportunity to contribute to enhancing Ukrainian collective efforts in combating cybercrime.
To view or add a comment, sign in
-
-
It was great to take part in the AI & Wine Networking event, meet new and old friends, and discuss business opportunities and cyber threats related to AI with ALLSTARSIT 💛💙 Iryna Dubyk Yuliia Shohan Great job!
-
-
-
-
-
+11
To view or add a comment, sign in
-
-
Excited to announce my participation in the upcoming AI & Wine Networking event in Kyiv. If you’re interested in how scammers use ChatGPT: • "80 or 2" – how to break ChatGPT’s gender statistics? • What connects Stanley Kubrick's "A Space Odyssey" with breaking ChatGPT’s moral constraints? • How to make ChatGPT cook C10H15N using a cult TV series? • Unintentional thief – how do AI cybercriminals use AI? • Why have Samsung, Apple, and American banks banned employees from using ChatGPT? Join me on April 10th for an engaging discussion and networking opportunity: https://lnkd.in/dFk7xhkx See you
To view or add a comment, sign in
-