Ukrainian Cybersecurity Firm Warns About New NotPetya Attack

It’s now well understood that NotPetya was designed to wreck havoc upon Ukrainian networks. It’s an attack that Cylance customers have been protected from since 2015, but June’s NotPetya outbreak spread outside of Ukraine to do damage in the hundreds of millions to billions of dollars to international companies. It was reported recently that international shipping giant Maersk alone took a huge financial hit.

“In the last week of the quarter we were hit by a cyber attack, which mainly impacted Maersk Line, APM Terminals and Damco. Business volumes were negatively affected for a couple of weeks in July and as a consequence, our Q3 results will be impacted. We expect that the cyber attack will impact results negatively by USD 200-300 million,” said Maersk CEO Soren Skou.

Cybersecurity experts suspect that the Russian military is using Ukraine as a testing ground for international cyber attacks. So when Ukrainian cybersecurity firms and institutions warn of impending cyber threats, the world should be listening.

The National Bank of Ukraine recently spotted signs of a looming malware threat with vague details in a letter sent to Reuters.

“The nature of this malicious code, its mass distribution, and the fact that at the time of its distribution it was not detected by any antivirus software, suggest that this attack is preparation for a mass cyber attack on the corporate networks of Ukrainian businesses,” the letter said.

The Bank isn’t taking Russian cyber threats lying down. They’re busy beefing up their cyber defenses.

“The NBU (National Bank of Ukraine) is involved in efforts to establish the NBU Computer Security Incident Response Team (CSIRT-NBU) to respond promptly to cyber incidents and share information in real time with all the banking sector participants and law enforcement agencies,” they said to Bank Info Security.

NotPetya – (Read more...)

*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Kim Crawley. Read the original post at: