Below is the timeline of the events related to the ongoing invasion of Ukraine that occurred in the previous weeks:
April 8 – Anonymous and the IT ARMY of Ukraine continue to target Russian entities
The popular hacking Anonymous and the IT ARMY of Ukraine continue to target Russian government entities and private businesses.
April 8 – Microsoft disrupted APT28 attacks on Ukraine through a court order
Microsoft obtained a court order to take over seven domains used by the Russia-linked APT28 group to target Ukraine.
April 6 – US dismantled the Russia-linked Cyclops Blink botnet
The U.S. government announced the disruption of the Cyclops Blink botnet operated by the Russia-linked Sandworm APT group.
April 6 – Ukraine warns of attacks aimed at taking over Telegram accounts
Ukraine’s technical security and intelligence service warns of threat actors targeting aimed at gaining access to users’ Telegram accounts.
April 5 – Russia-linked Armageddon APT targets Ukrainian state organizations, CERT-UA warns
Ukraine CERT-UA spotted a spear-phishing campaign conducted by Russia-linked Armageddon APT targeting local state organizations.
April 5 – Anonymous targets the Russian Military and State Television and Radio propaganda
Anonymous continues to support Ukraine against the Russian criminal invasion targeting the Russian military and propaganda.
Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform
Follow me on Twitter: @securityaffairs and Facebook
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, Russia)