The
The third quarter of 2022 marked a turning point in cyber-attacks related to the conflict in
From targeted destruction campaigns to guerrilla cyber-harassment, pro-Russian hacktivists are using DDoS1 attacks to make servers temporarily inaccessible and disrupt services. They are part of
?Eastern and
A new attack geography has taken shape over the last 12 months. At the very beginning of the conflict, the majority of incidents only affected
In the summer of 2022, there were almost as many conflict-related incidents in EU countries as there were in
Candidates for European integration such as
'In the third quarter of 2022,
From war hacktivists to cyber-harassment
Of all cyber-attacks reported worldwide since the start of the conflict, 61% were perpetrated bypro-Russian hacktivist groups, and in particular by Anonymous Russia, KillNet and Russian Hackers Teams, which have emerged since the start of the conflict to mirror the efforts of
The third quarter of 2022 marked a transition to a wave of DDoS attacks, in contrast to the first quarter of 2022, which saw a range of different kinds of attacks, divided more or less equally among data leaks and theft, DDoS attacks, espionage, influence campaigns, intrusion, ransomware, phishing, wiper and infostealer attacks2. Cyber attackers have since favoured DDoS attacks (75%) against companies and governments. This systematic harassment often has a low operational impact butsustains a climate of anxiety among security teams and decision-makers. Their objective is not to have a major operational impact but to harass targets and discourage them from supporting
On the other end of the spectrum, wiper attacks can destroy an adversary's systems, and long-term espionage can undermine the integrity of an adversary's security apparatus, but such techniques take much longer to prepare and require more resources. Destructive cyber-military operations, along with espionage, account for only 2% of the total number of incidents and are mainly targeted at Ukrainian public-sector organisations.
Russian authorities regularly use cyber to harass their adversaries without engaging in direct confrontation.
Acts of cyber warfare are still taking place in
Thales's contribution to the protection of critical infrastructure
Thales provides cybersecurity solutions for nine of the top ten Internet giants and helps to protect the information systems of more than 130 government agencies and essential services providers. With more than 3,500 cybersecurity experts, the company provides governments and critical infrastructure operators with integrated incident detection and response solutions, including cyber threat intelligence, sovereign probes, Security Operation Centres and encryption systems to prevent data breaches. Organised around three families of products and services - sovereign products, data protection platforms and cybersecurity services - the Group's portfolio of cyber solutions generated a combined total of more than
Read the abstract - Download the report
1A distributed denial-of-service attack (DDoS) aims to make one or more services unavailable either by exploiting a software or hardware vulnerability or by saturating a network's bandwidth to deny access to users.
2 Sale or rental of a proxy network to other malicious actors for use in launching cyber-attacks.
3 Phishing is an attempt to lure a user into divulging information. A wiper is a type of malware used to erase data from an infected system. An infostealer is a type of spyware used to collect information from a system.
About Thales
Thales (Euronext Paris: HO) is a global leader in advanced technologies within three domains: Defence & Security, Aeronautics & Space, and Digital Identity & Security. It develops products and solutions that help make the world safer, greener and more inclusive.
The Group invests close to
Thales has 77,000 employees in 68 countries. In 2022, the Group generated sales of
Contact
+33 (0)6 60 38 48 92 marion.bonnet@thalesgroup.com
(C) 2023 Electronic News Publishing, source