Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Ultimate Guide to Node.js Development Pricing for Enterprises

      July 29, 2025

      Stack Overflow: Developers’ trust in AI outputs is worsening year over year

      July 29, 2025

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      5 preinstalled apps you should delete from your Samsung phone immediately

      July 30, 2025

      Ubuntu Linux lagging? Try my 10 go-to tricks to speed it up

      July 30, 2025

      How I survived a week with this $130 smartwatch instead of my Garmin and Galaxy Ultra

      July 30, 2025

      YouTube is using AI to verify your age now – and if it’s wrong, that’s on you to fix

      July 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025
      Recent

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025

      Create Apple Wallet Passes in Laravel

      July 30, 2025

      The Laravel Idea Plugin is Now FREE for PhpStorm Users

      July 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025
      Recent

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025

      Opera throws Microsoft to Brazil’s watchdogs for promoting Edge as your default browser — “Microsoft thwarts‬‭ browser‬‭ competition‬‭‬‭ at‬‭ every‬‭ turn”

      July 30, 2025

      Activision once again draws the ire of players for new Diablo Immortal marketing that appears to have been made with generative AI

      July 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ukraine Reports 48% Jump in Cyber Incidents in H2 2024, but 77% Drop in High-Severity Incidents

    Ukraine Reports 48% Jump in Cyber Incidents in H2 2024, but 77% Drop in High-Severity Incidents

    April 30, 2025

    Fake Military Apps, Ministry of Defense of Ukraine, Fake Military Apps, GRISELDA, Eyes military app, Ukraine, Russia, Sensitive Data, authentication data, cyber incidents in H2 2024, CERT-UA, Ukraine, Russia, Cyberwarfare, Cyber Warfare

    In Ukraine, cyber warfare is no longer just code and servers. It’s frontline infrastructure, psychological warfare, and kinetic attacks rolled into one. According to the Computer Emergency Response Team of Ukraine’s latest report for cyber incidents in H2 2024, Russia-backed hackers have escalated their tactics: more aggressive, more automated, and far more coordinated with on-the-ground military action.

    The illusion of isolated cyberattacks is long gone. What Ukraine is facing now is digital siege warfare.

    cyber incidents in H2 2024, CERT-UA, Ukraine, Russia, Cyberwarfare, Cyber Warfare
    YoY Sector-wise Attack Statistics (Source: SSSCIP)

    Volume Up, Stealth Down

    CERT-UA handled 2,576 cyber incidents in H2 2024 alone—a 48% jump from the previous half. But while the total number of incidents skyrocketed, critical and high-severity incidents dropped by 77%. That sounds like progress, until you realise it may reflect better attack obfuscation, not lower risk.

    cyber incidents in H2 2024, CERT-UA, Ukraine, Russia, Cyberwarfare, Cyber Warfare
    (Source: SSSCIP)

    The malware playbook is also changing. There was a 112% increase in malware distribution campaigns, with phishing becoming increasingly industrialised. In many cases, attackers used cloud services like Google Drive and GitHub for malware hosting—effectively turning legitimate infrastructure into threat vectors.

    cyber incidents in H2 2024, CERT-UA, Ukraine, Russia, Cyberwarfare, Cyber Warfare
    (Source: SSSCIP)

    The Energy Sector: A Persistent Bullseye

    If there’s one thing Russia has been consistent about, it’s their obsession with Ukraine’s energy grid. CERT-UA confirms that cyberattacks now often precede missile strikes, following a coordinated pattern that merges cyber with kinetic warfare. These attacks are long-term projects—often executed over 6 to 8 months—with threat actors reusing previously compromised OT infrastructure and targeting supply chain vendors with weaker defenses.

    That’s not just espionage. That’s sabotage.

    Defense Targets and Military Devices: No Longer Untouchable

    The military is no longer just a target—it’s an active battlefield. New malware variants like FIRMACHAGENT and legacy toolkits like SPECTR were deployed against personnel and defense firms. These implants stole everything from GPS coordinates to Signal credentials.

    (Source: SSSCIP)

    CERT-UA tracked multiple clusters like UAC-0020 (Vermin) and UAC-0180 that targeted military communications, file shares, and even surveillance systems. In one instance, adversaries delivered malware disguised as fake mobile versions of legitimate battlefield software, exploiting the trust placed in internal systems.

    Also read: Vermin Hackers Resurface to Target Ukrainian Defense Forces with SPECTR Malware

    The infection chain was brutally efficient: APK downloads via Signal messages, Java code injected into cloned apps, remote control over infected phones. Once inside, the attackers weren’t just collecting data—they were shaping battlefield outcomes.

    Civilian Infrastructure as a Weaponized Domain

    The December breach of Ukraine’s Ministry of Justice state registries didn’t just delay services. It froze passport issuance, halted property transactions, and disrupted border crossings. It was a textbook demonstration of how civilian systems can become attack vectors with strategic impact.

    The cyberattack didn’t just inconvenience users. It paralyzed national functions—highlighting that for modern states, digital infrastructure is statecraft.

    Supply Chains: The New Soft Target

    While energy and defense sectors are hardened, attackers are pivoting to softer entry points: vendors. Several campaigns exploited unpatched vulnerabilities in third-party software like GeoServer (CVE-2024-36401) and WinRAR (CVE-2023-38831), compromising organizations through backdoor dependencies.

    CERT-UA warns that supply chain intrusions are now the norm, not the exception. Threat actors are learning to hijack trust relationships to scale their reach. Think SolarWinds, but localised and ongoing.

    Russia’s APT Clusters: Same Names, New Tricks

    Familiar threat actors like UAC-0001 (APT28) and UAC-0050 returned with updated playbooks. QR-code phishing campaigns, fake CAPTCHAs delivering PowerShell payloads, and archive-based exploits replaced older VBS-based malware. The evolution wasn’t in concept—it was in delivery.

    Also read: ‘I’m not a Robot’ reCAPTCHA Trojanized by Russian Hackers to Target Local Ukrainian Government

    Meanwhile, UAC-0185 (UNC4221) ran credential-stealing campaigns targeting Signal, Telegram, and battlefield coordination apps. They disguised payloads as conference invitations or legitimate correspondence, relying on social engineering as much as technical delivery.

    These aren’t spray-and-pray operations. They’re spear phishing at military precision.

    Also read: Russian State-Backed Hackers Intensify Attacks on Signal Messenger Accounts

    Rethinking Detection: The Case for Pre-Incident Intelligence

    Ukraine’s defenders aren’t just reacting. CERT-UA has built out a growing network of sensors and analytics platforms, many deployed with international support. Several attacks were classified as “near misses”—interrupted mid-execution thanks to early threat visibility.

    But the challenge is scale. With adversaries exploiting zero-days within 12 to 24 hours of disclosure, even minute delays in patching can be catastrophic. The only sustainable defense is anticipatory: threat hunting, telemetry sharing, and proactive adversary mapping.

    Information-Psychological Ops: The Silent Front

    Beyond the backdoors and RATs lies a subtler war. Russia’s cyber strategy includes IPSO—information-psychological operations. These aim to induce fear, panic, or doubt among civilians and service members alike. Even botched attacks serve a purpose if they shake trust in the system.

    CERT-UA confirms ongoing phishing attempts targeting individuals via Signal and WhatsApp, designed to exfiltrate private data and weaponize it for disinformation. In this hybrid war, the line between cyberattack and propaganda is intentionally blurred.

    The Cyberwar That Doesn’t End at the Keyboard

    The report makes one thing painfully clear: Ukraine’s cyber battlefield isn’t confined to code or firewalls. It’s phones, passports, electricity, and morale. Every compromised registry, spoofed mobile app, or hijacked vendor account is part of a broader effort to erode national resilience.

    Now in 2025, the question isn’t whether attacks will continue—it’s whether defenders can adapt faster than adversaries evolve.

    That’s the real arms race.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control
    Next Article India’s Answer to ChatGPT? Introducing Xanfi—A Culturally Tuned AI Assistant

    Related Posts

    Development

    Time-Controlled Data Processing with Laravel LazyCollection Methods

    July 30, 2025
    Development

    Create Apple Wallet Passes in Laravel

    July 30, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2023-31359 – AMD Manageability API Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-35941 – Apache Struts Password Exposure

    Common Vulnerabilities and Exposures (CVEs)

    AyySSHush: New Stealthy Botnet Backdoors ASUS Routers, Persists Through Firmware Updates

    Security

    CVE-2025-5870 – TRENDnet TV-IP121W Web Interface Improper Authentication Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-7433 – Sophos Intercept X for Windows Local Privilege Escalation Remote Code Execution

    July 17, 2025

    CVE ID : CVE-2025-7433

    Published : July 17, 2025, 8:15 p.m. | 29 minutes ago

    Description : A local privilege escalation vulnerability in Sophos Intercept X for Windows with Central Device Encryption 2025.1 and older allows arbitrary code execution.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    AI Agents Now Write Code in Parallel: OpenAI Introduces Codex, a Cloud-Based Coding Agent Inside ChatGPT

    May 17, 2025

    CVE-2025-37892 – Linux Kernel MTD INFTL Buffer Overflow

    May 20, 2025

    Sonatype reveals 18,000 malicious open source packages in its Q1 Open Source Malware Index

    April 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.