Hacks, leaks and wipers: Google analyzes a yr of Russian cyberattacks on Ukraine

On March 16, 2022, simply weeks after the beginning of Russia’s assault on Ukraine, hackers attacked an unnamed Ukrainian group with damaging malware designed to wipe its laborious drives. The identical day, suspected Russian attackers infiltrated a Ukrainian media firm to unfold a bogus story that Kyiv would give up to Moscow. Quickly thereafter, a crude deepfake appeared on-line exhibiting Ukrainian President Volodymyr Zelenskyy saying the nation would quickly quit its combat.
That sequence of occasions, which occurred as preventing intensified, exemplifies how Russia executed its hybrid method to warfare — with blended outcomes — over the previous yr, combining the usage of digital weapons and on-line propaganda alongside conventional navy operations in an try and win its brutal marketing campaign.
There’s “a sample of concurrent disruptive assaults, espionage, and [information operations] — probably the primary occasion of all three being carried out concurrently by state actors in a traditional conflict,” in line with a brand new report from Google’s Menace Evaluation Group, the tech big’s group that screens and works to thwart government-backed hacking in opposition to its 1 billion customers worldwide.
Due to its huge person base, Google occupies a singular perch to trace and analyze the digital features of the Ukraine conflict, which can mark its one-year anniversary on Feb. 24. The report additionally contains information from the menace intelligence agency Mandiant, acquired by Google Cloud in September, and Google Belief & Security.
In accordance with the report, the 1000’s of digital assaults that Google noticed are a part of an total Russian assault that has seen “a multi-pronged effort to realize a decisive wartime benefit in our on-line world, typically with blended outcomes,” in addition to a plethora of data operations searching for to form public notion of the conflict.
Shane Huntley, senior director of Google’s Menace Evaluation Group, mentioned the report makes an attempt to each collect and contextualize “a fairly broad vary of actions,” whereas being reasonable and never overstating the affect of the cyber actions. “There’s vital exercise occurring right here,” he mentioned, noting a “fixed barrage of assaults on all fronts, however that doesn’t imply there’s a vital success, or they’ve had any nice, important wins.”
Nonetheless, the variety of tried cyberattacks has skyrocketed, in line with Google. Russian phishing campaigns directed in opposition to NATO nations jumped by greater than 300% over the past yr, alongside a 250% enhance in phishing campaigns in opposition to Ukrainian targets and extra damaging malware assaults within the first 4 months of 2022 than the earlier eight years.
The report gives new particulars on the vary of cyberattacks, how they had been deployed, and who could have been behind them. From the phishing assaults to info and affect operations to the have an effect on on the worldwide cybercrime ecosystem, the one-year mark created a pure level to mirror, mentioned Huntley.
“There’s lots of people considering and theorizing about what cyberattacks appear like in a time of conflict,” he mentioned. “And now most likely that is the perfect instance we now have of a serious cyber energy engaged in a kinetic conflict, and a few actual visibility of how, no less than on this case, it was used. There might be classes that we must always study right here for future conflicts that may actually form the controversy.”
Huntley famous that there are issues that aren’t publicly recognized but, and key questions stay unanswered. For example, he mentioned it’s not clear how built-in and coordinated Russian cyber operations are with the kinetic navy operations. “Is it very well coordinated, or are they principally working independently? As a result of there’s some hints of that,” he mentioned.
The documented exercise is kind of in depth, although. As an example, the report lays out how over the course of 2021 Russian-aligned hacking teams focused Ukraine and targets in different nations with in depth phishing campaigns. One group Google calls Frozen Vista — also called UNC2589, SaintBear, Nascent Ursa or UAC-0056 by the Ukrainians — despatched greater than 14,000 credential phishing emails to targets world wide in an 11-day interval spanning September and October 2021. Throughout lulls in Russian phishing efforts between February 2022 and October 2022, a gaggle referred to as Pushcha — generally referred to as UNC1151 and linked to Belarus by Mandiant in November 2021 and linked to the prolific Ghostwriter info operation — turned extra lively, Google mentioned.
Some Russian hacking teams “intensified” their ongoing assaults on Ukraine over the course of 2022, whereas others, akin to ColdRiver, shifted their focus towards Ukraine. “Whereas we see Russian government-backed attackers focus closely on Ukrainian authorities and navy entities, the campaigns we disrupted additionally present a powerful concentrating on give attention to important infrastructure, utilities and public providers, and the media and knowledge house,” the report reads.
Russian hackers have a years-long historical past of concentrating on Ukraine with damaging malware, the report famous, together with the 2017 NotPetya assault that prompted an estimated $10 billion in damages globally. That historical past prompted many to concern an analogous spillover downside with the conflict, however that “largely didn’t occur in 2022,” the report states. However, “Mandiant noticed extra damaging cyberattacks in Ukraine through the first 4 months of 2022 than within the earlier eight years with assaults peaking across the begin of the invasion,” in line with the report.
Mandiant noticed no less than six distinctive wipers, a few of which had a number of variants, in line with the report, however the lasting affect was restricted. “Whereas the damaging cyberattacks did obtain vital widespread disruption initially in some Ukrainian networks, they had been probably not as impactful as earlier Russian cyberattacks in Ukraine,” the report learn. “To conduct the preliminary waves of damaging exercise, Russian actors typically employed accesses gained months earlier than, which had been typically misplaced because the assault was remediated.”
Different firms, akin to SentinelLabs and ESET, have revealed their very own analyses of the wiper variants and assaults.

The previous yr has seen a wave of Russian info operations, as nicely, together with efforts to form opinion overseas whereas additionally concentrating on home Russian audiences to bolster and preserve help for the conflict, in line with the report. Google disrupted greater than 1,950 situations of Russian info operation exercise on its platforms in 2022, the report learn. The knowledge operations associated to the conflict features a surge of exercise from self-declared hacktivists — some genuine, others cutouts for presidency exercise or working in help of Russian authorities priorities. These teams, akin to KillNet, XakNet, have interaction in ongoing distributed denial of service assaults in Ukraine, the U.S. and NATO nations, and have additionally carried out information leaks, Google mentioned.
The conflict has additionally examined the loyalties of financially motived cyber criminals, the report notes, with some declaring political allegiance to Russian objectives and others proclaiming neutrality. Maybe probably the most distinguished instance got here the day after the invasion when the infamous Conti ransomware crew declared loyalty to Russia and vowed to assault its enemies. A Ukrainian IT researcher with entry to Conti servers struck again, leaking troves of Conti inside chats and supplies, hobbling the group.
Fears of ransomware assault in opposition to the U.S. and NATO nations in response to Russian sanctions and different help for Ukraine had been “largely unrealized,” the researchers famous. However techniques historically linked to financially motivated teams have develop into more and more widespread in authorities assaults, the researchers mentioned. “This overlap of exercise is more likely to proceed all through the battle,” the report learn.
General, Huntley mentioned, there’s been a ramp-up of cyber hostilities between Russia and the West, which is one thing to keep watch over because the conflict continues to play out. “Relying on how this conflict evolves, and the way a lot Russia desires to lash out at NATO or different allies, that’s one thing to be careful for,” he mentioned. “It’s extra probably within the quick time period that this cyber exercise goes to spill out extra broadly than say kinetic exercise or navy exercise goes to spill out for pretty apparent causes.”