Ukraine
The horror show unfolding in Ukraine was foreshadowed by a series of cyber attacks which left websites of the defence, foreign and interior ministries unreachable or unusable. As well as those attacks, destructive malicious software infected hundreds of computers in Ukraine, as well as some in Lithuania and Latvia. On Thursday morning, several Russian government websites, including the Kremlin's, were also inaccessible. So far, cyber attacks have been relatively restrained. Some analysts believe it's unlikely to stay that way. Former head of the UK's National Cyber Security Centre, Ciaran Martin, has a balanced view.
In other Ukraine-related news;
- This is the first open-source war. The Centre for Information Resilience has created a map that draws on videos, photos and tweets to track Russia's military movements. Google Maps' Live Traffic showed the Russian invasion in real time.
Ukraine is a technologically savvy country; its president used messaging app, Telegram, to bypass Russian state controls and talk directly to the people.
- Reuters reports that the Ukraine government Ukraine has called for volunteers with hacking skills to help protect the country's critical infrastructure.
- Politico examines the challenge facing social media companies as they try to combat torrent of disinformation.
- Criminals are seeking to profit from the conflict by offering access to networks and databases that could be useful (to both sides).
- Shortly before the invasion began, the US and the UK published details of new malicious software which they said was developed by Russia's military cyber-unit.
- The crisis in Ukraine will have widespread economic impacts, including on the supply of computer processors. Ukraine is a key producer of neon gas which is used by lasers in chipmaking.
- A state-controlled news outlet in China (accidentally) leaked instructions on how to cover Ukraine. “Do not post anything unfavourable to Russia or pro-Western,” Horizon News staff were told.
- One cyber expert grew tired of being asked repeatedly about how to defend against Russian "cyber ops". His resulting advice has some great points for network administrators at any time, not just now.