Cyber Command Shares Technical Details of Malware Targeting Ukrainian Organizations
Bill would allow intel agencies to take business away from companies that buy spyware, House panel passes landmark privacy bill, Microsoft resumes blocking Office documents macros, much more
Check out my latest CSO column that looks at how the spate of government privacy initiatives that have ramped up since the Supreme Court’s decision to overturn Roe v. Wade will affect how companies collect, store, protect and share personal data.
U.S. Cyber Command shared the technical details related to what the agency says are several types of malware targeting Ukrainian entities in recent months.
Ukrainian officials shared the information with the U.S. government, Cyber Command said. The agency uploaded various technical details to VirusTotal, Pastebin, and GitHub. Although Cyber Command didn’t attribute the malware to any particular groups, Mandiant said it was the work of two separate cyberespionage groups, tracked as UNC1151 and UNC2589, that have been active in targeting Ukraine in multiple operations.
UNC1151 is thought to be associated with the Belarusian government as part of the ongoing regional disinformation campaign known as Ghostwriter, while UNC2589 is an effort that wor…
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.