Raleigh, NC

32°F
Broken Clouds Humidity: 60%
Wind: 3.09 M/S

Ukraine Sees Cyberattacks Surge 48% in Late 2024, as High-Severity Cases Fall 77%

Ukraine Sees Cyberattacks Surge 48% in Late 2024, as High-Severity Cases Fall 77%

Ukraine Faces Escalating Digital Siege as Cyber Warfare and Military Tactics Converge 

In Ukraine, cyber warfare has evolved beyond traditional hacking—it now intertwines with frontline conflict, psychological operations, and physical attacks. The Computer Emergency Response Team of Ukraine (CERT-UA) reports that in the second half of 2024, Russia-backed cyber actors intensified their operations, with increasingly automated, aggressive, and coordinated attacks closely aligned with military campaigns. 

From Cyber Incidents to Full-Scale Digital Siege 

CERT-UA responded to 2,576 cyber incidents in H2 2024—a 48% increase compared to the first half of the year. While high-severity cases declined by 77%, this doesn’t necessarily signal improvement. Instead, experts warn it may reflect more covert attack methods and advanced obfuscation. Malware distribution campaigns spiked by 112%, with phishing becoming highly industrialized. Threat actors exploited legitimate cloud services like Google Drive and GitHub to host malicious payloads, weaponizing trusted platforms. 

Ukraine’s Energy Sector Remains a Prime Target 

Russia continues its strategic focus on Ukraine’s energy grid. According to CERT-UA, cyberattacks frequently precede missile strikes in a synchronized hybrid warfare pattern. These intrusions often unfold over six to eight months, leveraging previously breached operational technology (OT) systems and infiltrating supply chain vendors with weaker security postures. 

Military Systems Under Direct Cyber Assault 

Ukrainian defense infrastructure has become a key battleground. New malware such as FIRMACHAGENT and legacy tools like SPECTR have been deployed against military personnel and defense contractors. These implants harvested sensitive data, including GPS locations and Signal app credentials. Threat clusters like UAC-0020 (Vermin) and UAC-0180 targeted communications systems, file repositories, and surveillance tools. In one campaign, malware was disguised as counterfeit mobile versions of official battlefield applications, delivered through Signal messages. The infection chain included APK downloads, injected Java code, and remote device control—shifting from data theft to battlefield manipulation. 

Civilian Systems Become Strategic Attack Vectors 

A December 2024 cyberattacks on Ukraine’s Ministry of Justice crippled critical registries, halting passport issuance, property transactions, and border processing. This incident underscored how civilian digital infrastructure can become a high-impact vector in modern conflict, effectively disrupting national operations. 

Supply Chains: The Weakest Link 

With defenses in critical sectors improving, attackers are now exploiting softer targets—vendors and third-party software. CERT-UA documented several campaigns that leveraged unpatched vulnerabilities in widely used tools like GeoServer (CVE-2024-36401) and WinRAR (CVE-2023-38831). These supply chain attacks are increasingly common, relying on compromised dependencies and trusted relationships—echoing SolarWinds-style tactics, now adapted to local conditions. 

Old Threat Actors, New Techniques 

Russia-aligned advanced persistent threat (APT) groups such as UAC-0001 (APT28) and UAC-0050 have returned with refreshed attack strategies. QR-code phishing, fake CAPTCHA challenges, PowerShell-based payloads, and archive-exploit tactics have replaced older VBS malware. While the core strategies remain consistent, their execution has become significantly more sophisticated. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.