The aftermath of the Kyivstar cyber attack is a warning for us all
Western networks could be infected already
The mass outage of Ukrainian mobile and internet provider Kyivstar on December 12 last year has now been attributed to the Russian state-sponsored Sandworm group by Ukraine’s Security Service (SBU).
The attack resulted in a total outage of the networks provided by Kyivstar, which included a number of early-warning attack systems, and caused a surge in traffic on other network providers in Ukraine as people sought alternative means of connectivity.
It has now been determined that the group were lingering inside the Kyivstar network from as early as May 2023.
Reader Offer: Save up to 68% on Aura identity theft protection
TechRadar editors praise Aura's upfront pricing and simplicity. Aura also includes a password manager, VPN, and antivirus to make its security solution an even more compelling deal. Save up to 50% today.
Preferred partner (What does this mean?)
A wider warning for NATO
The attack also targeted Kyivstar’s computer networks, deleting the data from thousands of servers and causing widespread long term damage to the network operators infrastructure. Speaking in an interview, the head of the SBU Illia Vitiuk said that the attack “completely destroyed the core of a telecoms operator."
“For now, we can say securely, that they were in the system at least since May 2023. I cannot say right now, since what time they had ... full access: probably at least since November.”
Adam Meyers, head of Counter Adversary Operations at CrowdStrike told TechRadar Pro that, “Reports around the destruction of Kyivstar’s virtual infrastructure coincide with reports of air raid sirens in Kiev malfunctioning, as well as payment terminals and multiple banks suffering disruption, and issues reported with payment for public transportation.”
“Since the onset of the conflict, Russian cyber operators have conducted intrusion operations for espionage, information operations, and destructive purposes against Ukrainian targets. An overarching motivation for the adversary is to contribute to psychological operations seeking to degrade, delegitimize, or otherwise influence public trust in state institutions and sectors such as government, energy, transportation and media.”
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The attack is suggested to be a part of Russia’s wider hybrid warfare tactics, where the Kremlin’s traditional military attacks are accompanied by cyber and psychological attacks. One such example is Russia’s missile, suicide drone and cyber attacks targeting Ukraine’s energy infrastructure in the winter of 2022-23 in an effort to erode morale and support of Ukraine’s general public for the war.
Such attacks highlight the potential dangers posed to NATO from the Kremlin and its affiliated cyber criminal enterprises. Last year, UK deputy prime minister Oliver Dowden suggested that people should stock up on battery powered radios, torches and first aid kits, listing Russia and cyber attacks as potential threats to the UK.
More from TechRadar Pro
- Orange Spain taken offline following massive cyberattack caused by "ridiculously weak" password
- In need of new security? Take a look at our guide to the best firewall software
- Top US healthcare firm reveals data breach affected millions of patients
Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.