The Russian Attack on Ukraine Put U.S. Businesses at Risk

Mar 22, 2022 | Cyber Security, IT News

With the Russian invasion of Ukraine, government officials here in the U.S. are warning organizations nationwide to prepare for possible retaliation from Russia and associated cybercriminal gangs. Regardless of whether you work with the government and/or are part of the supply chain, everyone is at risk.

Here is a rundown of the joint alert and a summary of what all businesses and organizations need to be aware of right now.

The Nature of the Threat

The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warn that data-destroying malware used against Ukraine prior to a large-scale Russian attack on the country poses a serious threat to our own. “Destructive malware can present a direct threat to an organization’s daily operations, impacting the availability of critical assets and data,” the U.S. agencies said in their public advisory. “Further disruptive cyberattacks against organizations in Ukraine are likely to occur and may unintentionally spill over to organizations in other countries.”

WhisperGate and HermeticWiper

In the government alert, CISA states the following:

Leading up to Russia’s unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable.

  • On Jan. 15, 2022, the Microsoft Threat Intelligence Center disclosed that malware, known as WhisperGate, was being used to target organizations in Ukraine. According to Microsoft, WhisperGate is intended to be destructive and is designed to render targeted devices inoperable.
  • On Feb. 23, 2022, several cybersecurity researchers disclosed that malware known as HermeticWiper was being used against organizations in Ukraine. According to SentinelLabs, the malware targets Windows devices, manipulating the master boot record, which results in subsequent boot failure.

Destructive malware can present a direct threat to an organization’s daily operations, impacting the availability of critical assets and data. Further disruptive cyberattacks against organizations in Ukraine are likely to occur and may unintentionally spill over to organizations in other countries. Organizations should increase vigilance and evaluate their capabilities encompassing planning, preparation, detection and response for such an event.

How to Protect Yourself

The Russian Attack on Ukraine Put U.S. Businesses at RiskThe advisory includes several technical recommendations for organizations to keep malicious software from spreading on their systems. The areas the alert covers include best practices and planning strategies for communication flow, access control, monitoring, file distribution, system and application hardening, recovery and reconstitution planning, and incident response.

Click here to read the full set of recommendations, which we will cover in detail in our next post.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic