{"id":45548,"date":"2022-03-03T00:00:00","date_gmt":"2022-03-03T00:00:00","guid":{"rendered":"urn:uuid:3ef5c937-8649-597f-9270-0ba9893a6eef"},"modified":"2022-03-03T00:00:00","modified_gmt":"2022-03-03T00:00:00","slug":"cyberattacks-are-prominent-in-the-russia-ukraine-conflict","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/","title":{"rendered":"Cyberattacks are Prominent in the Russia-Ukraine Conflict"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/Main-Ukraine-Russia-conflic.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/Main-Ukraine-Russia-conflic.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"45.859223300971\">\n<div readability=\"38.053398058252\">\n<p>The Conti intrusion set, which Trend Micro tracks under the moniker Water Goblin, has remained active despite other well-established ransomware groups shutting down in the wake of government sanctions. We also observed a spike in the volume of activity for the BazarLoader malware \u2014 a key enabler for Conti attacks \u2014 since early February 2022.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Conti chat logs leaked&nbsp;<\/span><\/p>\n<p>Meanwhile, external sources have reported on the chats of Conti operators being leaked by a Ukrainian security researcher who had access to the back end of Conti&#8217;s XMPP chat server. Trend Micro Research extracted the logs and found some artifacts that can be used to map some indicators of compromise (IOCs), which we list in a later section of this blog.&nbsp;<\/p>\n<p>The messages, which included ransom negotiations and Bitcoin addresses, can be used by security companies and law enforcement to identify the attack techniques and tools used by the Conti gang.&nbsp;<\/p>\n<p>Conti\u2019s onion site (contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion) is also currently active. Based on this, we identified some recent Conti files as Ransom.Win32.CONTI.SMYXBLD.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Stormous gang supports Russia<\/span><\/p>\n<p>We are seeing some encouraging malicious deeds against both Ukrainians and Russians, but some groups do choose to stand behind only one. The Stormous ransomware gang, known for website defacement and information theft, represents itself as a group of Arabic-speaking hackers. The group has been active since 2021, and recently it officially announced its support for the Russian government and its intention to <a href=\"https:\/\/twitter.com\/Cyberknow20\/status\/1498434090206314498\" target=\"_blank\" rel=\"noopener\">target Ukrainian government institutions<\/a> such as the Ukrainian foreign ministry.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"37\">\n<div readability=\"19\">\n<p>Upon analyzing a sample of the malware from the group, we found that after infiltration, the malware enables the actor to access and deploy different custom payloads to the affected server via remote upload and open-source resources like Pastebin. Its capabilities, which include dropping malware, encryption, and sending a ransom note, can be hard to identify since the actor can modify&nbsp; encryption and decryption keys, as well as copy ransom messages in the wild. Additionally, since the actor\u2019s backdoor or ransomware is PHP-based, it can be modified on the fly with minimal effort.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"38\">\n<div readability=\"21\">\n<p><span class=\"body-subhead-title\">Other notable findings&nbsp;<\/span><\/p>\n<p>In addition, the Emotet botnets (Epochs 4 and 5) have remained highly active since Emotet\u2019s resurgence in November 2021, with a few sporadic periods of inactivity. Both families continue to actively drop Cobalt Strike beacons.&nbsp;<\/p>\n<p>Both BazarLoader and Emotet continue to drop Cobalt Strike beacons as part of their second stage infections. With respect to Conti, we are tracking the regular deployment of new command-and-control (C&amp;C) infrastructure for Cobalt Strike command beacons. It\u2019s worth noting that we have not yet observed a Conti attack following an Emotet infection since November 2021.&nbsp;<\/p>\n<p>We also have a snapshot of malicious activity showing how some actors may be trying to capitalize on the crisis. We compared our January and February data and saw that malicious URLs and emails trying to lure users with the subject of \u201cUkraine\u201d increased steeply in the latter part of February.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"35\">\n<div readability=\"15\">\n<p><span class=\"body-subhead-title\">Ukraine-related spam emails&nbsp;<\/span><\/p>\n<p>We are seeing new scams and variants of older threats appear daily. Using our honeypot, we also found Ukraine-related spam emails that aim to take advantage of the situation via donations and other scams. These spam emails also drop the Ave Maria malware. We provide IOCs in the relevant section of this blog.<\/p>\n<p>We provide some examples here via the following screenshots:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"35.044871794872\">\n<div readability=\"15.794871794872\">\n<p>Trend Micro continues to actively find and detect these threats before they can inflict damage on our customers.<\/p>\n<p><span class=\"body-subhead-title\">Analyzing reports from CERT-UA<\/span><\/p>\n<p>Reports from outside Trend Micro have provided valuable insights into the alleged cyberattacks. In particular, the Computer Emergency Response Team of Ukraine or <a href=\"https:\/\/cert.gov.ua\/\" target=\"_blank\" rel=\"noopener\">CERT-UA<\/a> released important details on the attacks launched against Ukrainian targets. Our own threat researchers have also analyzed and investigated the latest information. Below is a timeline of significant attacks recorded by CERT-UA.&nbsp;&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"42.427167113494\">\n<div readability=\"31.820375335121\">\n<p>Hostile activities in cyberspace are likely to increase as tension increases. Cyberattacks aimed at Ukraine might also inadvertently extend to other countries and unsuspecting targets might experience ricochets of attacks, similar to <a href=\"https:\/\/blog.trendmicro.co.jp\/archives\/24285\" target=\"_blank\" rel=\"noopener\">stray bullets<\/a>. Therefore, it is important for everyone \u2014 regardless of geographical location \u2014 to be aware of incidents occurring in Ukraine.&nbsp;<\/p>\n<p>The following sections provide both an analysis and an evaluation, conducted by Trend Micro, of three cyberattacks reported by CERT-UA.<\/p>\n<p><span class=\"body-subhead-title\">Cyberattack using WhisperGate<\/span><\/p>\n<p>CERT-UA <a href=\"https:\/\/cert.gov.ua\/article\/18101\" target=\"_blank\" rel=\"noopener\">reported<\/a> that between January 13 and 14, 2022, approximately 70 Ukraine government agency websites were attacked, resulting in the modification of website content and system corruption. Supply chain attacks, OctoberCMS (a self-hosted content management system used by enterprises), and the <a href=\"https:\/\/blog.trendmicro.co.jp\/archives\/29441\" target=\"_blank\" rel=\"noopener\">Log4j vulnerability<\/a> are suspected to be the points of entry.<\/p>\n<p>Some of these attacks involved system corruption by malware. The diagram in Figure 8 illustrates the infection chain of the malware observed in the attack. We list the malware names as identified by CERT-UA here.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33\">\n<div readability=\"11\">\n<ul>\n<li><span class=\"rte-red-bullet\">BootPatch: This malware destroys the Master Boot Record (MBR) to make computers unbootable.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">WhisperGate: This malware downloads and executes additional payload from the C&amp;C server constructed on Discord.&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">WhisperKill: This malware, downloaded by WhisperGate, destroys files with specific extensions.<\/span><\/li>\n<\/ul>\n<p>WhisperKill is designed to destroy and rename files in connected drives that match the file extensions shown in Figure 9. It then terminates and removes itself. WhisperKill enumerates drives A to Z and destroys files on drives that are either Type 3 (DRIVE_FIXED) or 4 (DRIVE_REMOTE), as shown in Figure 10.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"42.165048543689\">\n<div readability=\"30.398058252427\">\n<p>On February 24, there were also <a href=\"https:\/\/mobile.twitter.com\/ESETresearch\/status\/1496581916367151115\" target=\"_blank\" rel=\"noopener\">reports<\/a> of another more sophisticated wiper malware with the ability to destroy the MBR and files in drives. The malware is called HermeticWiper (also known as FoxBlade).<\/p>\n<p><span class=\"body-subhead-title\">Cyberattacks using SaintBot&nbsp;<\/span><\/p>\n<p>In January 2022, there were <a href=\"https:\/\/cert.gov.ua\/article\/18273\" target=\"_blank\" rel=\"noopener\">reports<\/a> of a series of cyberattacks that started from spear-phishing emails disguised as messages from the National Healthcare Service of Ukraine. The emails were attached with a document and two shortcut files, where one shortcut file downloads and executes the OutSteel malware using PowerShell. The OutSteel malware then downloads and executes the SaintBot malware. In February 2022, spear-phishing emails aiming to distribute the SaintBot malware disguised as messages from the Ukraine Police were also <a href=\"https:\/\/cert.gov.ua\/article\/18419\" target=\"_blank\" rel=\"noopener\">reported<\/a>.&nbsp;<\/p>\n<p>The SaintBot malware is designed to be inactive when the Language Code Identifier (LCID) of the infected device is Russia, Ukraine, Belarus, Armenia, Kazakhstan, or Moldova (as seen in Figure 11). The intent behind this is unclear, and the inclusion of Ukraine might be a mistake considering that the spear-phishing emails are clearly targeting Ukraine.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33.5\">\n<div readability=\"12\">\n<p>This malware sample attempts to bypass user account control (UAC) by exploiting Fodhelper, which is introduced from the Windows 10 platform. By executing Fodhelper and adding a registry entry (shown in Figure 12), SaintBot is able to execute its own copy in a startup folder with administrative privilege.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"43.378151260504\">\n<div readability=\"33.142857142857\">\n<p>Upon callback, SaintBot collects information from the infected computers, then encrypts and encodes the data with XOR and BASE64. The data is attached to a prefix and sent to the C&amp;C server with a POST request.<\/p>\n<p>This malware sample holds the following C&amp;C servers:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">hxxp:\/\/8003659902[.]space\/wp-adm\/gate.php&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">hxxp:\/\/smm2021[.]net\/wp-adm\/gate.php&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">hxxp:\/\/8003659902[.]site\/wp-adm\/gate.php<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Cyberattack conducted by Gamaredon<\/span><\/p>\n<p>Gamaredon is a threat actor said to be active since 2013. In March 2020, attacks were observed in Japan and were considered stray bullets. In November 2021, the Security Service of Ukraine made a <a href=\"https:\/\/ssu.gov.ua\/en\/novyny\/sbu-vstanovyla-khakeriv-fsb-yaki-zdiisnyly-ponad-5-tys-kiberatak-na-derzhavni-orhany-ukrainy\" target=\"_blank\" rel=\"noopener\">public announcement<\/a> that attributed Gamaredon to the Federal Security Service of the Russian Federation (FSB). The Security Service of Ukraine also <a href=\"https:\/\/www.youtube.com\/watch?v=Rci5xiyMv7k\" target=\"_blank\" rel=\"noopener\">published<\/a> details of attack methodologies and a wiretap voice. Trend Micro observed similar attack methodologies.&nbsp;<\/p>\n<p>Attacks start from spear-phishing emails with document files that cause a Remote Template Injection. In a cyberattack <a href=\"https:\/\/cert.gov.ua\/article\/18365\" target=\"_blank\" rel=\"noopener\">observed<\/a> on the February 1, 2022, a document template was downloaded that included an obfuscated malicious macro. The macro stealthily opens a document (~~AddFromString) where the \u201cVZ01\u201d function is executed (Application.Run &#8220;VZ01&#8221;) then closes it. This is illustrated in Figure 13.&nbsp;<\/p>\n<p>This method, where a malicious macro is inserted into another document, was observed in a past incident said to be conducted by Gamaredon.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"52.219251336898\">\n<div readability=\"49.732620320856\">\n<p>The decoded and inserted macro drops VBScript at %APPDATA%:define (ADS), and then a scheduled task to execute the script is registered. This script downloads and executes an additional payload from the C&amp;C server, similar to other attacks observed. The callback contains an infected PC ID in User Agent, which is disguised to be a Yandex browser.<\/p>\n<p>The following is the URL where the additional payload is requested:<\/p>\n<ul>\n<li>hxxp:\/\/&lt;IP address of deep.deserts.coagula[.]online&gt;\/barefooted.cfg&lt;Current Time + 1 second&gt; (e.g. hxxp:\/\/10.172.0[.]3\/barefooted.cfg2022\/02\/03%2020:49:31)<\/li>\n<\/ul>\n<p>If the response content size is over 16,965 bytes, the downloaded content is stored as \u201c%USERPROFILE%\\Downloads\\demand.exe.tmp\u201d and is executed after being renamed as \u201c%USERPROFILE%\\Downloads\\demand.exe\u201d.&nbsp;<\/p>\n<p>For specific mitigation measures against the cyberattacks listed previously, see our post <a href=\"https:\/\/blog.trendmicro.co.jp\/archives\/30466\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><span class=\"body-subhead-title\">Security recommendations and best practices&nbsp;<\/span><\/p>\n<p>Malicious activity continues to spread, and actors are using new tools and tricks to lure victims. In this section, we discuss mitigation measures to help prepare for a broad range of attacks:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Avoid exposing infrastructure to the internet unless necessary.&nbsp;&nbsp;<br \/><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Ensure that multifactor authentication (MFA) is enabled for all accounts, not just the important ones.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Ensure the timely deployment of patches, prioritizing internet-facing infrastructure and sensitive systems such as domain controllers.&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Immediately activate incident response measures in case there are red flags that indicate BazarLoader, Emotet, and Cobalt Strike activities \u202f&nbsp;<\/span><\/li>\n<\/ul>\n<p>For more guidance on how to manage cyber risks, please see our earlier blog post <a href=\"https:\/\/www.trendmicro.com\/en_ca\/ciso\/22\/b\/global-cyberattacks-cyber-risk.html\" target=\"_blank\" rel=\"noopener\">here<\/a>.&nbsp; &nbsp;&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Conclusion<\/span><\/p>\n<p>In these tense circumstances, information is sent from conflicting viewpoints. Additionally, even if the same facts are reported correctly, impressions delivered might vary due to a difference in perspectives.&nbsp;<\/p>\n<p>It is also worth noting that the issuance of false information is always a possibility \u2014 whether or not this is done intentionally. As a result of such information, unnecessary confusion and further division might ensue. The following are some measures that our researchers take in order to understand information as correctly as possible:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Be aware of the possibility of having assumptions (biases) and mistakes within the truth that we believe.&nbsp;<br \/><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Be aware that we might be at the center of propaganda.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Recognize that there is no such thing as a completely neutral and impartial source of information.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Distinguish between \u201cfacts\u201d and \u201copinions\u201d or \u201cassumptions\u201d within information.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">When possible, trace the primary source of important information. One way to do this would be to check the source of quoted articles and review their full content and the context of their statements.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Refer to a reliable source of information, such as articles reviewed by multiple experts before release, as well as articles written by specialists.<\/span><\/li>\n<\/ul>\n<p>For a full list of IOCs, please download this <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/IOC%20Resource%20for%20Russia-Ukraine%20Conflict-Related%20Cyberattacks-03032022.pdf\" target=\"_blank\" rel=\"noopener\">document<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/c\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alongside the physical conflict happening between Russia and Ukraine, there have also been an increasing number of alleged cyberattacks perpetrated by different groups.<br \/>\nOur research teams have verified and validated internal data and external reports to provide accurate information that can be used to strengthen defenses against these attacks. We will continuously update this blog with validated threats as more events unfold. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45549,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9508,9513,9577,9539,9516],"class_list":["post-45548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-malware","tag-trend-micro-research-phishing","tag-trend-micro-research-ransomware","tag-trend-micro-research-reports"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacks are Prominent in the Russia-Ukraine Conflict 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacks are Prominent in the Russia-Ukraine Conflict 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-03T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/Main-Ukraine-Russia-conflic.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyberattacks are Prominent in the Russia-Ukraine Conflict\",\"datePublished\":\"2022-03-03T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/\"},\"wordCount\":1801,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Phishing\",\"Trend Micro Research : Ransomware\",\"Trend Micro Research : Reports\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/\",\"name\":\"Cyberattacks are Prominent in the Russia-Ukraine Conflict 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg\",\"datePublished\":\"2022-03-03T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberattacks are Prominent in the Russia-Ukraine Conflict\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks are Prominent in the Russia-Ukraine Conflict 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/","og_locale":"en_US","og_type":"article","og_title":"Cyberattacks are Prominent in the Russia-Ukraine Conflict 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-03T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/Main-Ukraine-Russia-conflic.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyberattacks are Prominent in the Russia-Ukraine Conflict","datePublished":"2022-03-03T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/"},"wordCount":1801,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Malware","Trend Micro Research : Phishing","Trend Micro Research : Ransomware","Trend Micro Research : Reports"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/","url":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/","name":"Cyberattacks are Prominent in the Russia-Ukraine Conflict 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg","datePublished":"2022-03-03T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyberattacks-are-prominent-in-the-russia-ukraine-conflict\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Cyberattacks are Prominent in the Russia-Ukraine Conflict"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45548"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45549"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}