Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
It’s been over a year since Russia’s unprovoked invasion of Ukraine, and for those in the tech sector cyber warfare has defined the conflict. Ukrainian organisations, both public and private, have been subject to attacks including wiper malware, spear phishing, and data breaches.
National cyber security agencies, as well as teams of security experts from throughout the field, remain on high alert for heightened Russian cyber activity. Understanding the strategies of these hackers, as well as their individual motivations, has been key to retaining the integrity of targeted systems.
In this episode, Jane and Rory speak to Daniel Thanos, head of Arctic Wolf Labs, to discuss the current state-sponsored threat group landscape, and how the terms of the conflict have shifted over time.
Highlights
“Some groups are more closely affiliated to the government than others. And that could be because quite literally you might have members of the group that it’s their moonlighting job, they literally can be folks that are involved in state cyber operations but by night this is like their freelance gig.”
“I think the outcome that the Russians certainly wanted, happened differently. What I will tell you is if you talk to people that I've been involved in the Ukrainian CERT, the folks that are actually involved in the cyber defence of Ukraine, they have thwarted a lot of attacks. And they continue to do so every day.”
“Their intelligence programmes against NATO aren't going to change, they're only going to intensify. Because now as a result of this war, and as a result of their disastrous policies, they're going to get exactly what they didn't want, which is an expansion of NATO. So NATO now is going to become an even bigger threat to them. And so you can be guaranteed that they're going to only increase their cyber operations against it.”
Read the full transcript here.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Footnotes
- Intellias: Disaster recovery during Russia's war on Ukraine
- Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine
- 'CryWiper' trojan disguises as ransomware, says Kaspersky
- The new wave of cyber security threats facing critical national infrastructure (CNI)
- What is cyber warfare?
- Russian cyber attacks on Ukraine: What we know so far
- Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine
- UK's £6m cyber support package for Ukraine revealed for first time
- Critical infrastructure at risk again from Stuxnet-like attack
- Stuxnet is back, Iran admits
Subscribe
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Openreach targets emissions reductions, faster broadband roll-out with Google Cloud dealNews The telecoms giant has built digital twins of the UK’s “key transportation corridors” to identify regions for infrastructure upgrades
-
NCSC warns vibe coding poses a major risk to businessesNews Vulnerability management approaches are not maturing fast enough to keep up with the downsides of AI-generated code
-
SPECIAL EDITION: How AI is changing educationSponsored Podcast With the right support and communication, educational organizations can use AI to empower teachers and students alike
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Redefining risk managementSponsored Podcast With a Risk Operations Center (ROC), leaders can proactively crack down on cyber risks instead of simply reacting to them
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
