ESET Research Podcast: Ukraine’s past and present cyberwar

Cyber Security

Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country

Long before the first Russian soldier set foot on Ukrainian soil, the country had been a target of sophisticated digital operations spying on its officials, and sabotaging its critical infrastructure and other sectors. It was even the ground zero for the most destructive cyberattack in history, known as NotPetya.

That trend continues during the current crisis. ESET researchers have uncovered an array of new, advanced cyberthreats infiltrating Ukrainian governmental organizations with a single goal – to cause as much damage as possible. Besides describing the tactics, techniques, and procedures of these threats, we provide context and explain when such attacks against Ukraine started, how they evolved over time, which of them could be considered successful, and what to expect in the future.

We invite you to join ESET Distinguished Researcher Aryeh Goretsky, ESET Head of Threat Research Jean-Ian Boutin, and ESET Senior Malware Researcher Robert Lipovsky in their discussion of these recent attacks in the context of years of cyberattacks targeting Ukraine.

For additional information on the topic, visit Ukraine Crisis – Digital Security Resource Center.

If you like what you heard in the podcast, subscribe to the ESET Research podcast on any of the popular podcast applications including Spotify, Google Podcasts, Apple Podcasts, and PodBean.

Products You May Like

Articles You May Like

Facebook Introduces New Features for End-to-End Encrypted Messenger App
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]
Mastodon vs. Twitter: Know the differences
PY#RATION: New Python-based RAT Uses WebSocket for C2 and Data Exfiltration

Leave a Reply

Your email address will not be published. Required fields are marked *