Logo Threat Intelligence

[Alert] Russia-Ukraine Situation: Increase in major security breaches

Threat Intelligence • Mar 09, 2022

With the escalating Russia-Ukraine situation, organizations globally are being urged to urgently increase their cyber security posture.
Threat Actors have deployed destructive malware in relation to the Russia-Ukraine crisis known as WhisperGate and HermeticWiper Malware.
Global events, such as pandemics, global financial crisis, and now war, trigger significant increases in security breaches.
Financially motivated threat actor groups are very opportunistic and will launch attack campaigns including war themed phishing and malware campaigns.
As the war continues to escalate, politically motivated threat actor groups will rise and perform both broad and targeted attacks against companies.
State sponsored threat actors are also likely to target, and escalate existing access, within specific organisations including critical infrastructure providers.

What do you need to do?

Exploitable Vulnerabilities

Identify and remediate critical exploitable vulnerabilities that are internet accessible.

Supply Chain Breaches

Prevent third-party breaches affecting you. Implement 2FA, monitor for leaked passwords, and restrict access to external providers.

Detect Breaches

Security monitoring to detect indicators of compromise and C2 or ransomware traffic is critical to be able to respond.

Incident Response

Russian threat actors have been seen to move laterally in a breached company within 19 minutes. It is critical that breaches can be contained within minutes to prevent major financial and privacy impacts.

How can Threat Intelligence help?

Threat Intelligence can orchestrate and automate all of these capabilities through our Evolve platform in less than an hour to provide on-demand security enhancements.
Our specialist security team can also provide advice and services to help keep your business safe.
Contact us now.

IoT Penetration Testing
By Anupama Mukherjee 02 May, 2024
Mastering IoT Penetration Testing: Uncover Vulnerabilities, Ensure Robust Security. Learn Proven Methods & Best Practices. Elevate Your IoT Device Protection Now
Cybersecurity Project Management
By Threat Intelligence 24 Apr, 2024
In this blog, we're exploring cybersecurity project management and the role it plays in securing a business.
By Threat Intelligence 19 Apr, 2024
Unlock the secrets to navigating the intricacies of the Defence Industry Security Program (DISP) with confidence. Our expert team offers invaluable insights and tailored support to help you meet DISP's rigorous security assessment requirements.
Threat Modeling
By Threat Intelligence 12 Apr, 2024
In this blog post, we'll explore what threat modeling is all about, why it's important, and how it can prevent cyberattacks.
Share by: