Russia’s cyber strategy in Ukraine becomes more complex, involves automated tools and supply chain attacks

Russia’s cyber strategy in Ukraine becomes more complex, involves automated tools and supply chain attacks

Specialists from CERT-UA, part of Ukraine’s State Service for Special Communications and Information Protection (SSSCIP), have released an analytical report titled “Russian Cyber Operations H2'2024.” The report provides a detailed analysis of cyber threats detected during the second half of 2024, focusing on changes in tactics and priorities of Russian hacker groups.

The report notes a 48% increase in cyber incidents compared to the first half of 2024, with a notable rise in attack complexity and the sensitivity of the targeted systems. Russian hackers are actively using automation, supply chain attacks, and combining espionage with sabotage techniques.

The main focus of the cyberattacks has been intelligence gathering, particularly data that could impact the frontline military situation. Russian cyberattacks have targeted situational awareness systems and specialized defense enterprises.

Several Russian hacker groups, including UAC-0050, have expanded their activities. UAC-0050, previously focused on cyber espionage, has begun stealing financial assets and conducting information-psychological operations under the "Fire Cells Group" banner. They have also deployed malware distribution campaigns through legitimate services like Bitbucket and GitHub and increased phishing attempts targeting a broader range of organizations.

Another group, UAC-0099, continues espionage activities and has targeted government organizations, including forestry and medical institutions, as well as factories. UAC-0020 (Vermin) carried out targeted attacks on military personnel in summer 2024, while UAC-0180 has been focusing on defense enterprises and military personnel using evolving malware tools.

UAC-0185 (UNC4221) has been active since 2022, focusing on stealing credentials from messaging platforms like Signal, Telegram, and WhatsApp, as well as from military systems. Additionally, UAC-0002 (APT44, Sandworm) targeted Ukraine’s "Army+" digital document management system by creating fake versions of its app, distributing malicious installers that provided remote access to victims' computers.

During the second half of 2024, CERT-UA observed the use of exploits for several vulnerabilities across different operations, including: GeoServer (CVE-2024-36401), HFS HTTP File Server (CVE-2024-23692), Adobe Acrobat Reader (CVE-2023-21608), Roundcube (CVE-2023-43770), WinRAR (CVE-2023-38831).

Back to the list

Latest Posts

Cyber Security Week in Review: May 16, 2025

Cyber Security Week in Review: May 16, 2025

In brief: Microsoft, Fortinet, Ivanti, and Google patch zero-days, crypto exchange Coinbase reveals a data breach, and more.
16 May 2025
Russia-linked espionage operation targeting webmail servers via XSS flaws

Russia-linked espionage operation targeting webmail servers via XSS flaws

The campaign exploits XSS vulnerabilities in widely used webmail servers to steal sensitive data from high-value targets.
15 May 2025
Kosovo man extradited to US for running BlackDB.cc criminal marketplace

Kosovo man extradited to US for running BlackDB.cc criminal marketplace

If convicted on all counts, Masurica faces up to 55 years in federal prison.
14 May 2025