Role of Telegram and other emerging platforms in the Ukraine war

There is a growing concern in the Western countries that Russian propaganda in the Ukraine war has been used Telegram and other new social media platforms intensively. While mainstream platforms, including Twitter and Facebook/Meta exercised intensive content moderation around the Ukraine war, new platforms have a more relaxed content moderation policy.

You can consult this article for more details about the challenge of what they frame as the use of  ‘unmoderated platform’ in the Ukraine war. This is incorrect since all platforms, including Telegram, have some level of content moderation.

You can read more on this issue in the blog post published by Lawfare. 

Microsoft disrupts Russian cyberespionage campaign

The Microsoft Threat Intelligence Center (MSTIC) has disrupted malicious phishing campaigns by Seaborgium, a Russian threat actor aligned closely with the Russian government. Microsoft claims to have disrupted the phishing operations with the help of Google’s Threat Analysis Group and the Proofpoint Threat Research Team.

Seaborgium primarily targets non-governmental organisations (NGOs), intergovernmental organisations (IGOs), think tanks, and defence and intelligence consulting firms in NATO countries. According to the Microsoft Threat Intelligence Center (MSTIC), ‘Such targeting has included the government sector of Ukraine in the months leading up to the invasion by Russia and organizations involved in supporting roles for the war in Ukraine.’

The Seaborgium group uses open-source intelligence, personal directories, and social media platforms like LinkedIn to surveil targeted individuals. Additionally, threat actors use trustworthy email providers to contact their target while posing as someone else. Following contact with the victim, the threat actor sends a malicious link to request the victim’s login details to steal data and credentials.

Ukraine state agency publishes cyberattacks statistics

The State Service of Special Communications and Information Protection (SSSCIP) of Ukraine published statistics about the number, targets, and type of cyberattacks since the beginning of the Russian invasion.

The government and local authorities, defence, finance, commercial organisations, and the energy sector, in that order, were the main targets of the 796 recorded cyberattacks. Information gathering, malicious code, infiltration attempts, and availability were important cyberattack strategies.

European mayors fooled into calls with fake Kyiv mayor

The mayors of several European cities held meetings via video link with a person they thought was the mayor of Kyiv, Vitali Klitschko, only to find out they were deceived by a deepfake of Klitschko.

The office of Berlin Mayor Franziska Giffey tweeted Friday night that his conversation with the alleged mayor of Kyiv was ended after his comments raised suspicion.

Jose Luis Martinez-Almeida, the mayor of Madrid, likewise cancelled a video call when he suspected he was not speaking with his Kyiv colleague. Meanwhile, Budapest mayor Gergely Karácsony said in a Facebook post that he had also recently been targeted and had ended the call following ‘several strange, suspiciously provocative questions’. Meanwhile, Michael Ludwig, the mayor of Vienna, was convinced he had talked with Klitschko and even tweeted that they had a video chat. The tweet was deleted after the official account of the Austrian capital published a statement that Ludwig appeared to be the victim of a ‘serious case of cybercrime’.

Questions arose whether the fake Klitschko was a deepfake. German investigative journalist Daniel Laufer found an earlier interview with Klitschko on YouTube that served as the digital source material for the scam. Had a deepfake been used, Laufer argues, the video frames would have been altered in ways that no longer matched the YouTube recording. Apparently this might have been an edited version, not a more-sophisticated deepfake.

 

  

Russian hackers accused of launching attacks against targets in Lithuania and Norway

Several public and private sector websites in Lithuania were temporarily down on Monday following a cyberattack reportedly carried out by a Russian-backed hacking group. The Lithuania National Cyber Security Centre (NKSC) warned of an ‘intense ongoing’ Distributed Denial of Service (DDoS) attack against the Secure National Data Transfer Network, as well as governmental institutions and private companies. Killnet, a pro-Russian group, claimed responsibility for at least some of the attacks, claiming it was in reprisal for Lithuania blocking the delivery of certain products to the Russian outpost of Kaliningrad.

Meanwhile, in Norway, a DDOS attack targeted a secure national data network, affecting several private and public institutions. According to Norwegian officials, Russian hackers were likely behind the cyberattack, although there was minimal damage, with ‘no sensitive information tak

Microsoft: Russian state-backed hackers targeted Ukrainian allies

Since the start of the Ukraine war, Russian state-backed hackers have engaged in network infiltration and espionage operations against 128 businesses in 42 countries that are allied with Ukraine, Microsoft claimed in a new report.

While Russian hackers prioritised NATO governments, they have also launched attacks against think tanks, humanitarian organisations, IT companies, and critical infrastructure. Microsoft estimates that 29% of identified attacks were successful, with a quarter of those leading to data theft. Microsoft also asserts that Russia is conducting an information war to influence public opinion in favour of the conflict domestically and overseas.

Ukrainians targeted with Cobalt Strike, CredoMap malware

‘The APT28’ (aka Fancy Bear) hacking group supported by Russia is believed to be responsible for a recent spike in phishing campaigns that are spread by email, warns The Ukrainian Computer Emergency Response Team (CERT-UA Team)

CERT-UA Team explained that emails warning of ‘unpaid taxes’ or ‘nuclear terrorism’ are intended to lure victims into opening the file contained in the email. They cautioned that opening the files might cause users to download the malicious software Cobalt Strike or CredoMap.

Meta loses appeal in Russian court over ‘extremist activity’ label

Meta Platforms, Inc. lost an appeal in a Moscow court after being found guilty of ‘extremist activity’ in Russia in March.

According to a Kommersant reporter in the courtroom, Meta’s lawyer argued that refusing to block access to content and labelling state-controlled media were not activities that meet the definition of extremism.

The court decision requires that whenever organisations or people publicly mention Meta, they need to disclose that Meta’s operations are illegal in Russia.