One more evidence of coordination of kinetic and cyber operations by russian aggressors. Ukrainian largest private energy company DTEK was cyberattacked simulateously with shelling of thermal power plant of the same company in Kryvyi Rih. Both targets are 100% civilian.
Dear Colleagues, I have completed my term as CDTO of the
@SSSCIP
. It will be superfluous to talk about the successes of the Service as a whole, the CERT-UA team and the State Cyber Protection Center, in particular, during the war.
In cybersecurity, states usually try to avoid the attention of the press, although sometimes it may be a matter of public importance. In such cases, the journalist's professionalism is key. Today’s keynote speaker
@KimZetter
has always been an example of professional dedication.
Today is my last working day in
@SSSCIP
. Thank you all for your support of our Service and our fight with enemy in cyberspace. Hope my successor will continue supporting all initiatives and international cooperation. Look forward to get back to you soon in my new mission.
I’ll be looking forward to it and doing everything I can do to bring victory closer, to welcome my dear friend
@CISAJen
in Kyiv, and maybe there will be some
@gibsonguitar
too.
Following the latest news on mobilization in the state sponsor of terrorism I have one concern: will new skilled conscripts join russian cyber offensive units to escalate cyber aggression to new levels?
It was my pleasure and honor of meeting in person with
@patrikhson
,
@netnod
Technical Director and our great friend and present him an award from
@SSSCIP
for his unwavering support of Ukraine and our telecom infrastructure 🇺🇦🤝🇸🇪
I would like to extend my gratitude to
@CISAgov
for their unwavering partnership and support.
@CISAJen
and the Team, you’re doing an awesome job, and it’s a privilege for us in
@SSSCIP
to congratulate you with your 5th Anniversary! 🇺🇦🤝🇺🇸
That’s how it was in Kyiv just a year ago. I hope that next year it will be like this.
Щасливого Різдва! Merry Christmas! Frohe Weihnachten! Joyeux Noël! Feliz Navidad! Buon Natale!
Thanks to all our friends for standing with Ukraine! Happy Holidays! 🎄
What an honor to have Yevhen, Viktor, and Yevheniia from
@CERT_UA
here at
#CyberThreat22
for a keynote on their response to attacks on Ukrainian infrastructure.
London was as always splendid. A series of meetings packed in one day - apologies for not informing all friends and partners. Looking forward to coming back soon.
Today there was a second attempt to discredit
@_CERT_UA
in recent months by russian hackers. Solntsepyok group attacked Suspilne Media and spread fake news on our team's non-involvement in response. Surprisingly these influence operations are based on recognition of our success.
Thank you, Belfast!
@CYBERUKevents
is certainly one of the best conferences I’ve ever attended. Thank you
@Lindy_Cameron
and all
@NCSC
team for our privilege to be invited. Looking forward to seeing you at
#CyberUkraine
.
🇺🇦🤝🇬🇧
Another great example of fruitful cooperation. Many thanks to
@Microsoft
for your substantial support of
@_CERT_UA
and contribution to Ukrainian cyber resilience!
Microsoft has identified targeted attacks against the defense sector in Ukraine and Eastern Europe by the threat actor Secret Blizzard (KRYPTON, UAC-0003) leveraging DeliveryCheck, a novel .NET backdoor used to deliver a variety of second stage payloads.
🇺🇸🇺🇦Such a privilege to meet with our incredible Ukrainian colleagues yesterday to discuss further deepening our cybersecurity collaboration with
@dsszzi
. Super grateful for the partnership & looking forward to building on it to collectively defend against global cyber threats.
This is something new we are doing at
@dsszzi
proposing wider discussion and analyzing trends in cyberwarfare. The report is a kind of summary of 2022 events and a basis for forecasts. Feedback is highly welcome.
Excited by the results of
@_CERT_UA
collaboration with
@RecordedFuture
on identifiying APT28 (also known as BlueDelta/Fancy Bear/Sofacy/Forest Blizzard) infrastructure targeting email servers of Ukrainian organizations, including government entities.
Recorded Future’s Insikt Group in collaboration with
@_CERT_UA
, has detected a campaign exploiting vulnerable Roundcube servers in
#Ukraine
, cross-correlated with a spearfishing campaign uncovered by Recorded Future’s Network Traffic Intelligence.
This is actually my privilege to meet in person and talk to distinguished
@ciaranmartinoxf
, CB, Professor and first CEO of
@NCSC
. Thanks for your great insights and leadership!
What an honour to talk to the great
@VZhora
of Ukraine’s 🇺🇦
@dsszzi
about his team’s amazing work over the past year under unprecedented pressure.
An inspiration for us all
#cyberthreat22
@SANSEMEA
& so much to learn from
Cybersecurity is not only about timely detection and prevention of cybersecurity threats but also about rapid recovery. In the context of a full-scale cyberwar, I would focus on this. So far, it seems to be the most effective attack on CI in Ukraine since Feb 24, 2022.
On International Volunteer Day, I want to thank all cyber volunteers for their invaluable contribution to Ukrainian and global cyber resilience at a time of unprecedented russian aggression.
🇺🇦🎙️ Ever wondered about the frontline of digital warfare?
@VZhora
is in the thick of it, defending Ukraine's satellite systems from cyberattacks. Get insights from the deputy chairman of
@SSSCIP
on today's
#SafeMode
episode.
Tune in now! 👉
It was my great pleasure to participate in a panel discussion ‘Operational Resilience In Action: Lessons Learnt From Ukraine’ together with Illia Vitiuk and
@gzajaczkowski
under excellent moderation by
@BilyanaLilly
#WSF2023
Ievhen Bryksin,
@_CERT_UA
Deputy Chief gives a speech at
#CyberChess2023
in Riga on research and technical analysis of large-scale cyber attacks in Ukraine (2022-2023)
Ievhen Bryksin, the deputy chief of
@_CERT_UA
is a keynote speaker at
@SANSEMEA
@NCSC
#CyberThreat22
sharing Ukrainian experience of countering russian cyber aggression in time of armed invasion.
Jen, thank you so much!
@SSSCIP
partnership with you and
@CISAgov
is invaluable for us! And I’m extremely honored staying near these stairs together with our greatest supporters from US public and private sector. Thank you
@TomBurt45
and
@Microsoft
.
#BREAKING
:
#Albania
’s prime minister announces the severing of diplomatic relations with
#Iran
after a cyberattack. This happened around the time of the MEK conference, which had to be cancelled as well due to a terror threat.
Stand with Ukraine. Invest in Ukraine despite the war. The future of next generations is being defined here and now. Thanks
@cahlberg
for your support!
I am quite thrilled to announce
@RecordedFuture
's hiring campaign in Ukraine (in country!). Seeking the best engineers! Over the next 2.5 years we’re planning to hire 100 more people in Ukraine. Please see the attached blog post for specific job postings.
Today, the foreign ministries of Ukraine and ten other countries established the Tallinn mechanism on cybersecurity: Canada, Denmark, Estonia, France, Germany, the Netherlands, Poland, Sweden, the UK, and the US.
The Tallinn mechanism will help strengthen Ukraine's
I’d like to express my deepest gratitude to all my friends and colleagues from the United States. Thank you for
#StandingWithUkraine
. Happy Thanksgiving!
3️⃣ On Ukraine 🇺🇦
"I'm proud of the role the NCSC played with
@FCDOGovUK
& allies in supporting the Ukrainians’ staunch cyber defence in the face of Russian hostility.
"If there is to be a single takeaway from the conflict, it is the importance of effective cyber resilience."
A global dilemma whether to invest in cybersecurity workforce in public sector and CII or to build a cybersecurity startup ecosystem can be simplified by the use of AI: it can potentially replace many of cyber defenders while it cannot replace innovative solutions developers.
Thanks, Shannon for your great article. I didn’t expect out talk could cause such a huge discussion in the community. And russian propagandists tried to use it too. Unsuccessfully, as always.
Just a brief note to all my US friends. I’ve spent some minutes watching someone Carlson interviewing some insane. I have never watched more bullshitting per minute in my entire life. Please keep this in mind if you’re interested in watching this pure propaganda.
Ten years ago
@vx_herm1t
had his website shut down by Ukrainian security officials and was charged with distributing computer viruses. Now he's helping his country fend off Russian hackers (via
@ddd1ms
)
I look forward to visit Tallinn after our victory, meet and thank our colleagues from Estonia and other NATO countries who have provided and continue to provide Ukraine with such important assistance in cybersecurity. And we definitely have a lot to share with our partners.
The flag of
#Ukraine
was raised today next to those
@NATO
member states at
@ccdcoe
to welcome 🇺🇦 on the road to membership. 🇺🇦 will be a valuable contributor when it wins the war and starts to rebuild. For that we support and
#StandWithUkraine
️ in every possible way.
That was my great experience and pleasure talking at
#AkamaiWorldTour
in London. We discussed how lessons learned from countering cyber aggression in Ukraine can contribute to our partners’ resilience.
We're witnessing an innovative moment at
#AkamaiWorldTour
London! Ukraine's CISO, Viktor Zhora, and Akamai's Sean Lyons shared the stage, sparking a conversation around invaluable insights into the world of application protection.
#AkamaiSecurity
#ApplicationSecurity
@HowellONeill
We do not need to answer any questions. We showed our good will in sharing it with partners. You decided to replicate mistakes and hype on it during our war.
Thrilled to see our very first partner in Ukraine
@_CERT_UA
in Kyiv last week. Their work on unmasking threat actors, publishing deep reports on malware/ TTPs, and being an incredible sharer of intelligence is a role model for all national CERTs around the world - thank you
@PaulSonne
@washingtonpost
@nytimes
The only possible scenario for negotiations is the resumption of control over the territory of Ukraine within the 1991 borders.
Here's a very important message for all who are involved in offensive cyber operations against terrorussia. I guess the situation in other countries is similar to Denmark.
Our Director, Sir Jeremy Fleming, writes in
@TheEconomist
about the impact cyber has had in Putin's war and how we have been operating to support Ukraine, by addressing dis-information and safeguarding critical cyber infrastructure.
Read it here ⬇️
The Infosec world can have heroes too. Here is a champion I hold in the highest regard,
@VZhora
of
@dsszzi
. He leads a team with a daunting task, they have to defend against a sophisticated foe who has invaded with a military and cyber forces as well.
I am so proud of the MoU agreed & signed between SSSCIP 🇺🇦 and DNSC 🇷🇴 aimed at strengthening our bilateral cooperation & cyber resilience
Thank you Yurii SHCHYHOL, Viktor ZHORA, Oleksandr POTYI !
@dsszzi
@DNSC_RO
#cyber
#cooperation
#Ukraine
#Romania
This is the time for super empowered individuals or groups -
@thedarktangent
on response to the invasion to Ukraine at the
@BlackHatEvents
briefings opening.
@FBI
Director Christopher Wray on his work: “Focus on work, focus on people you work with and focus on people you work for”. Brief and excellent description of my own thoughts on this. Great quote to remember.
Honored to meet
@VZhora
and Alexander Komarov, two Ukrainian leaders who are successfully maintaining vital communication links and securing digital systems from Russian aggression. Cybersecurity is not often a life or death matter, but for Ukraine & Ukrainians, it is. Thank you.
@davidgilmour
Dear David, many thanks for your kind support of our country. I’m a very big fan of yours and Pink Floyd music and do hope that you together with your grand-daughters will come to free, peaceful and renovated Ukraine very soon. 🇺🇦🤝 🇬🇧
I am grateful to the Chairman, my colleagues and friends from the team of deputies, probably the best team in Ukraine, as well as all my extraordinary and dedicated colleagues. Huge thanks to all our international and domestic partners in Ukraine for you unwavering support!
There was a part devoted to Ukraine. And I do hope the alternative to Stephan Soesanto’s research will appear soon to create a complete picture on Ukrainian resistance against russian cyber aggression.
#BlackHat2022
And we are proud having Kim as a keynote speaker at
#UISGCON13
in 2017 in Kyiv. Today's speech was a great example of what true cybersecurity journalism should be.