Timeline of Cyber Incidents Attributed to the Russian-Ukraine Conflict

Cropped Cover Photo For Data Localizaiton Shutterstock 660792934

Disinformation, false flags, DDoS attacks, and destructive wiper malware are a part of Russian military doctrine.”

Rick Holland, Digital Shadows CISO, 2022

A timeline in the build up to, and during the Russian invasion of Ukraine to keep track of and stay on top of cyber incidents. Dates of gathered intel are in AEDT+11.

I’ve decided to extend this list to include all cyber activity. I’ll be focusing on additional data from 26 Feb onwards.

Will continue to update with new information.

Date (AEST)Target CountrySectorOrganisationDescriptionGroupSources
13 JanUkraine*Govt
Private
Infrastructure**
Multiple govt
Non-profit
IT organisations
Kitsoft
Destructive malware, HermeticaWiper, from the Whispergate family, used to destroy files, disguised as ransomware.

Data exfiltration, credentials, shell access to certain govt sites observed based on dark web posts selling these assets.
DEV-0586 / GamaredonMicrosoft
Security Week
14 JanUkraineGovt
Private
Ministry of Foreign Affairs
Ministry of Education and Science
~70 sites
Defaced websites using OctoberCMS [CVE-2021-32648]DEV-0586The Guardian
19 JanUkraineGovtUndisclosedAttempts to test malware and recycle historical techniques involving VNC.GamaredonPalo Alto
19 JanCanadaGovtGlobal Affairs CanadaUnknown incident, investigation ongoing. Non-critical internet and internet-based services taken down as part of mitigation.Not knownCBC
15 FebUkraineGovt
Finance
Ministry of Defence
Privatbank
Oschadbank
Diya Portal
DDOS for 2 hoursRussian Main Intelligence Directorate (GRU)NPR
NSDC Ukraine
15 FebUkraineCiviliansCiviliansFake text messages sent to civilians claiming ATMs have gone offline (debunked). Resulted in mass panic withdrawal.Not knownTwitter / NPR
18 FebGovt
Infrastructure
Strategic enterprises
Security
Defence
Multiple massive DDOS, ongoingRussian traffic networksNSDC Ukraine
24 FebUkraineGovt
Finance
Multiple websites
Ukraine Defence and Foreign ministries
Council of Ministers
PrivatBank
State Savings Bank & multiple banks
DDOS, Wiper MalwareMultiple
24 FebPrivateFlightradar24DDOS, disrupting service to tracking potential military aircraftNot knownZDNet
24 FebDonetsk,
Ukraine
PrivateDPR Denis PushilinDDOS conducted on personal websiteNot knownTASS
24 FebUkraineGovtSystem of Electronic Interaction of Executive Bodies (SEI EB)Mass contamination of information resources of public authorities. Documents uploaded to the portal contain malicious executable scripts that download malware (executed primarily by clicking “Enable Editing button within Office apps)GamaredonNSDC Ukraine
25 FebRussiaGovtmil.ruDDOS on site, credential leakGhostSecTreadstone 71
25 Feb
6pm
RussiaGovtkremlin.ru
duma.gov.ru
mil.ru
Self-imposed geofencing, potentially to prevent DDOS 6pm (GMT+2)Twitter
25 FebRussiaFinanceSberbank
Alfabank
DDOS for 2 hoursNot knownTwitter***
25 FebRussiaGovt
Media
rt.com
Kremlin.ru
en.fas.gov.ru
lenta.ru
DDOSAnonymousTwitter
Twitter
25 FebCrimea,
Ukraine
GovtIT InfrastructureDDOS 8:28pm (GMT+2)Interfax
25 FebEuropean clusterPrivateMultiple Telegram channelsOverloading Telegram infrastructure resulting in intermittent short-term outages. Multiple Telegram channels experiencing a spike in subscribers, notably bots flooding in (i.e. bot attacks). e.g. political gossip channel Nezygar.Brief forced to remove its short link to prevent further flooding and potential ban (Telegram policy)Pavel Durov
Telegram
26 FebGangContiConti releases statement announcing full support of Russian government
26 FebRussiaFinanceSberbank
VTB Bank
DDOS
26 FebRussiaInfrastructureRussian Railways
Roscosmos
DDOSTelegram
26 FebUkraineMilitaryArmed Forces personnelSpearphishing campaign targeting private accounts of armed forces personnel, primarily @i.ua and @meta.uaUNC1151Bleeping Computer
26 FebRussiaInfrastructureMultiple sitesAnonymous to begin targeting various infrastructure, databases, web servers and networks https://anonfiles.com/tfn6obK8x3/RussiaC2Ips_rtf Anonymous
GhostSec
Twitter
28 FebRussiaGangContiUkrainian Conti member hacked the gang’s internal Jabber/XMPP server and leaked conversations ContiTwitter

* Attack appears to be targeted, targeting a contractor who has offices based in Latvia, and another contractor in Lithuania.
** Ukraine’s Ministry of Foreign Affairs reports that more than 100 of the world’s Fortune 500 companies rely at least partially on Ukrainian IT services, with several Ukrainian IT firms being among the top 100 outsourcing options for IT services globally.
*** Flagging this event as Unverified as there is only one source and Twitter is being used as a platform for disinformation.


All facts and links in this post are represented as accurately as possible given the volatility and influx of information. If there are discrepancies, please contact me and I will update accordingly. All views and opinions expressed are my own.