Ukraine and Russia seems to be at the moments on both traditional and cyber war. We could call that hybrid warfare. We are at a cyber war. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. Russia’s invasion of Ukraine has been a hybrid war from the start, a mix of conventional military strategy — traditional “boots on the ground” — and a slightly more unconventional, digital or cyberwar. On the morning of February 22, 2022, the world woke to the news that Russia had moved troops into two separatist regions of eastern Ukraine. Russia started to conduct attacks to Ukraine on February 24. Before physical attacks Russia did several cyber attacks towards IT systems in Ukraine.
Here are links to some material on the cyber side of this war:
How the Eastern Europe Conflict Has Polarized Cyberspace
https://blog.checkpoint.com/2022/02/27/how-the-eastern-europe-conflict-polarized-cyberspace/
The war between Russia and Ukraine is advancing. People everywhere are deciding who they will support. The same dynamic happens in the cyberspace. Hacktivists, cybercriminals, white hat researchers or even technology companies are picking a clear side, emboldened to act on behalf of their choices. Historically, Russia has had superiority over Ukraine in the cyberspace. And last week, Ukraine was attacked by destructive wiping malware. However, the situation is starting to change, as most of the non-nation cyber state actors are taking the side of Ukraine. To defend itself, the Ukrainian government has created an international IT army of hacktivists.
As war escalates in Europe, it’s ‘shields up’ for the cybersecurity industry
https://techcrunch.com/2022/03/02/as-war-escalates-in-europe-its-shields-up-for-the-cybersecurity-industry/
In unprecedented times, even government bureaucracy moves quickly. As a result of the heightened likelihood of cyberthreat from Russian malactor groups, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) — part of the Department of Homeland Security — issued an unprecedented warning recommending that “all organizations — regardless of size — adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.”
Digital technology and the war in Ukraine
https://blogs.microsoft.com/on-the-issues/2022/02/28/ukraine-russia-digital-war-cyberattacks/
All of us who work at Microsoft are following closely the tragic, unlawful and unjustified invasion of Ukraine. This has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyberattacks on computer networks and internet-based disinformation campaigns. We are fielding a growing number of inquiries about these aspects and our work, and therefore we are putting in one place a short summary about them in this blog. This includes four areas: protecting Ukraine from cyberattacks; protection from state-sponsored disinformation campaigns; support for humanitarian assistance; and the protection of our employees.. Also:
https://threatpost.com/microsoft-ukraine-foxblade-trojan-hours-before-russian-invasion/178702/
Ukraine: Cyberwar creates chaos, ‘it won’t win the war’
https://www.dw.com/en/ukraine-cyberwar-creates-chaos-it-wont-win-the-war/a-60999197
There have been at least 150 cyberattacks in Ukraine since Russia’s invasion. Their effect is mainly psychological, and experts say they won’t decide the war.
Russia’s invasion of Ukraine has been a hybrid war from the start, a mix of conventional military strategy — traditional “boots on the ground” — and a slightly more unconventional, digital or cyberwar.
The global technology company Microsoft has said its Threat Intelligence Center (MSTIC) detected “destructive cyberattacks directed against Ukraine’s digital infrastructure” hours before the first launch of missiles or movement of tanks on February 24.
Those attacks, which Microsoft dubbed FoxBlade, included so-called wipers — malicious software or malware — that make their way inside computer networks and literally wipe the data from all connected devices.
Cybersecurity experts in Germany have said there have been over a hundred cyberattacks, in various forms, since then. But their effect has mainly been psychological.
Why Russia Hasn’t Launched Major Cyber Attacks Since the Invasion of Ukraine
https://time.com/6153902/russia-major-cyber-attacks-invasion-ukraine/
In the relatively short and rapidly evolving history of cyber conflict, perhaps nothing has been established with greater certainty and more widely accepted than the idea that Russia has significant cyber capabilities and isn’t afraid to use them—especially on Ukraine. In 2015, Russian government hackers breached the Ukrainian power grid, leading to widespread outages. In 2017, Russia deployed the notorious NotPetya malware via Ukrainian accounting software and the virus quickly spread across the globe costing businesses billions of dollars in damage and disruption.
As tensions escalated between Russia and Ukraine, many people were expecting the conflict to have significant cyber components.
But as the invasion continues with few signs of any sophisticated cyber conflict, it seems less and less likely that Russia has significant cyber capabilities in reserve, ready to deploy if needed. Instead, it begins to look like Russia’s much vaunted cyber capabilities have been neglected in recent years, in favor of developing less expensive, less effective cyber weapons that cause less widespread damage and are considerably easier to contain and defend against. For instance, many of the cyberattacks directed at Ukraine in the past month have been relatively basic distributed denial-of-service attacks.
Given Russia’s past willingness to deploy cyberattacks with far-reaching, devastating consequences, it would be a mistake to count out their cyber capabilities just because they have so far proven unimpressive. And it’s all but impossible to prove the absence of cyber weapons in a nation’s arsenal. But the longer the conflict goes on without any signs of sophisticated cyber sabotage, the more plausible it becomes that the once formidable Russian hackers are no longer playing a central role in the country’s military operations.
Crowd-sourced attacks present new risk of crisis escalation
https://blog.talosintelligence.com/2022/03/ukraine-update.html
An unpredictable and largely unknown set of actors present a threat to organizations, despite their sometimes unsophisticated techniques.
Customers who are typically focused on top-tier, state-sponsored attacks should remain aware of these highly motivated threat actors, as well. Misattribution of these actors carries the risk of nations escalating an already dangerous conflict in Ukraine. Based on data from our fellow researchers at Cisco Kenna, customers should be most concerned about threat actors exploiting several recently disclosed vulnerabilities, highlighting the importance of consistently updating software and related systems.
Russia, Ukraine and the Danger of a Global Cyberwar
https://www.securityweek.com/russia-ukraine-and-danger-global-cyberwar
On the morning of February 22, 2022, the world woke to the news that Russia had moved troops into two separatist regions of eastern Ukraine. At the time of writing, it is not yet a full invasion of Ukraine, but Russia did conduct attacks on February 24, hitting cities with airstrikes and artillery in what was called a “special military operation” by Russian President Vladamir Putin.
Russia has been waging its own cyberwar against Ukraine for many years.
Since the beginning of 2022, however, it seems that Russian cyber activity against Ukraine has increased. This includes evidence that wiper malware has again disrupted some Ukrainian government networks, and attacks from the FSB-linked Gamaredon have targeted around 5,000 entities, including critical infrastructure and government departments. So far, however, there has not been the same scale of disruption as occurred in 2015, 2016 and 2017.
The purpose of such cyber activity is to weaken critical infrastructure, damage government’s ability to respond to any aggression, and to demoralize the population.
The U.S. has been warning the rest of the world against a potential widening scope of Russian cyber activity, and that cyber defenses generally should be tightened.
“Part of the worry,” said Willett, “is that cyberattacks against Ukraine might bleed over, like NotPetya, to affect other countries and cause wider damage unintentionally. There is some concern that the Russians may intentionally do stuff more widely, but that would probably be in retaliation for something that the U.S. or NATO might do.
This raises the whole question of ‘attribution’. The received belief is it is impossible to do accurate cyber attribution. ““It would be a mistake for any one nation to think it could attack another without being known,” said Willett.That is absolutely wrong,” said Willett.
But accidents happen. The two iconic cyberweapons have been Stuxnet and NotPetya. It is assumed that the U.S. developed Stuxnet (although this has never been admitted). NotPetya has been confidently attributed to the Russian government. Both malwares escaped from their assumed targets into the wider world. This was probably accidental – but similar accidents could lead to wider implications during a period of global geopolitical tension.
On the morning of February 24, 2022, Russian troops invaded Ukraine. This was accompanied by a further increase in cyber activity.
Ukraine Digital Army Brews Cyberattacks, Intel and Infowar
https://www.securityweek.com/ukraine-digital-army-brews-cyberattacks-intel-and-infowar
Formed in a fury to counter Russia’s blitzkrieg attack, Ukraine’s hundreds-strong volunteer “hacker” corps is much more than a paramilitary cyberattack force in Europe’s first major war of the internet age. It is crucial to information combat and to crowdsourcing intelligence.
Inventions of the volunteer hackers range from software tools that let smartphone and computer owners anywhere participate in distributed denial-of-service attacks on official Russian websites to bots on the Telegram messaging platform that block disinformation, let people report Russian troop locations and offer instructions on assembling Molotov cocktails and basic first aid.
The movement is global, drawing on IT professionals in the Ukrainian diaspora whose handiwork includes web defacements with antiwar messaging and graphic images of death and destruction in the hopes of mobilizing Russians against the invasion.
The cyber volunteers’ effectiveness is difficult to gauge. Russian government websites have been repeatedly knocked offline, if briefly, by the DDoS attacks, but generally weather them with countermeasures.
It’s impossible to say how much of the disruption — including more damaging hacks — is caused by freelancers working independently of but in solidarity with Ukrainian hackers.
A tool called “Liberator” lets anyone in the world with a digital device become part of a DDoS attack network, or botnet. The tool’s programmers code in new targets as priorities change.
Ukraine Cyber Official: We Only Attack Military Targets
https://www.securityweek.com/ukraine-cyber-official-we-only-attack-military-targets
A top Ukrainian cybersecurity official said Friday a volunteer army of hundreds of hackers enlisted to fight Russia in cyberspace is attacking only what it deems military targets, prioritizing government services including the financial sector, Kremlin-controlled media and railways.
Victor Zhora, deputy chair of the state special communications service, also said that there had been about 10 hostile hijackings of local government websites in Ukraine to spread false text propaganda saying his government had capitulated. He said most of Ukraine’s telecommunications and internet were fully operational.
Zhora told reporters in a teleconference that presumed Russian hackers continued to try to spread destructive malware in targeted email attacks on Ukrainian officials and — in what he considers a new tactic — trying to infect the devices of individual citizens.
Army of Cyber Hackers Rise Up to Back Ukraine
https://www.securityweek.com/army-cyber-hackers-rise-back-ukraine
An army of volunteer hackers is rising up in cyberspace to defend Ukraine, though internet specialists are calling on geeks and other “hacktivists” to stay out of a potentially very dangerous computer war.
According to Livia Tibirna, an analyst at cyber security firm Sekoia, nearly 260,000 people have joined the “IT Army” of volunteer hackers, which was set up at the initiative of Ukraine’s digital minister Mykhailo Fedorov.
The group, which can be accessed via the encrypted messaging service Telegram, has a list of potential targets in Russia, companies and institutions, for the hackers to target.
It’s difficult to judge the effect the cyber-army is having.
Russia Releases List of IPs, Domains Attacking Its Infrastructure with DDoS Attacks
https://thehackernews.com/2022/03/russia-releases-list-of-ips-domains.html
Russia Blocks Access to Facebook Over War
https://www.securityweek.com/russia-blocks-access-facebook-over-war
Russia’s state communications watchdog has ordered to completely block access to Facebook in Russia amid the tensions over the war in Ukraine.
The agency, Roskomnadzor, said Friday it decided to cut access to Facebook over its alleged “discrimination” of the Russian media and state information resources. It said the restrictions introduced by Facebook owner Meta on the RT and other state-controlled media violate the Russian law.
Cyberattack Knocks Thousands Offline in Europe
https://www.securityweek.com/cyberattack-knocks-thousands-offline-europe
Thousands of internet users across Europe have been thrown offline after what sources said Friday was a likely cyberattack at the beginning of Russia’s offensive in Ukraine.
According to Orange, “nearly 9,000 subscribers” of a satellite internet service provided by its subsidiary Nordnet in France are without internet following a “cyber event” on February 24 at Viasat, a US satellite operator of which it is a client.
Eutelsat, the parent company of the bigblu satellite internet service, also confirmed to AFP on Friday that around one-third of bigblu’s 40,000 subscribers in Europe, in Germany, France, Hungary, Greece, Italy and Poland, were affected by the outage on Viasat.
In the US, Viasat said on Wednesday that a “cyber event” had caused a “partial network outage” for customers “in Ukraine and elsewhere” in Europe who rely on its KA-SAT satellite.
Viasat gave no further details, saying only that “police and state partners” had been notified and were “assisting” with investigations.
General Michel Friedling, head of France’s Space Command said there had been a cyberattack.
Cybercriminals Seek to Profit From Russia-Ukraine Conflict
https://www.securityweek.com/cybercriminals-seek-profit-russia-ukraine-conflict
Dark web threat actors are looking to take advantage of the tensions between Russia and Ukraine, offering network access and databases that could be relevant to those involved in the conflict, according to a new report from Accenture.
Since mid-January, cybercriminals have started to advertise compromised assets relevant to the Russia-Ukraine conflict, and they are expected to increase their offering of databases and network access, with potentially crippling effects for the targeted organizations.
Just over a month ago, soon after the destructive WhisperGate attacks on multiple government, IT, and non-profit organizations in Ukraine, threat actors started to advertise on the dark web access to both breached networks and databases that allegedly contained personally identifiable information (PII).
Amid Russian invasion, Ukraine granted formal role with NATO cyber hub https://therecord.media/amid-russian-invasion-ukraine-granted-formal-role-with-nato-cyber-hub/
Ukraine was granted the formal role of “contributing participant” to the hub, known as the Cooperative Cyber Defence Centre of Excellence (CCDCOE), by its 27-member steering committee, the organization announced. “Ukraine’s presence in the Centre will enhance the exchange of cyber expertise, between Ukraine and CCDCOE member nations, ” Col.
Jaak Tarien, the institution’s director, said in a statement.
This Ukrainian cyber firm is offering hackers bounties for taking down Russian sites https://therecord.media/this-ukrainian-cyber-firm-is-offering-hackers-bounties-for-taking-down-russian-sites/
In the days following Russia’s invasion of Ukraine, dozens of hacking groups have taken sides in the conflict, launching attacks on various organizations and government institutions. Cyber Unit Technologies, a Kyiv-based cybersecurity startup, has been particularly outspoken on Tuesday, the company started a campaign to reward hackers for taking down Russian websites and pledged an initial $100, 000 to the program.
High Above Ukraine, Satellites Get Embroiled in the War
https://www.wired.com/story/ukraine-russia-satellites/
While the Russian invasion rages on the ground, companies that operate data-collecting satellites find themselves in an awkward position.
Some researchers are worried that the reliance on satellite imagery has given too much power to the companies that control this technology. “There’s companies like Maxar and Planet that are privately owned and they have the final say on whether or not they want to share the information, ” says Anuradha Damale. The role of private companies in conflicts such as Ukraine means commercial satellites could become targets. In the days before Russia invaded, US space officials warned satellite companies that the conflict could extend into space.
CISA Releases Advisory on Destructive Malware Targeting Organizations in Ukraine https://www.cisa.gov/uscert/ncas/current-activity/2022/02/26/cisa-releases-advisory-destructive-malware-targeting-organizations
CISA and the Federal Bureau of Investigation have released an advisory on destructive malware targeting organizations in Ukraine. The advisory also provides recommendations and strategies to prepare for and respond to destructive malware. Additionally, CISA has created a new Shields Up Technical Guidance webpage that details other malicious cyber activity affecting Ukraine. The webpage includes technical resources from partners to assist organizations against these threats.
Alert: https://www.cisa.gov/uscert/ncas/alerts/aa22-057a
US firms should be wary of destructive malware unleashed on Ukraine, FBI and CISA warn – CNNPolitics
https://www.cnn.com/2022/02/26/politics/ukraine-malware-warning-cybersecurity-fbi-cisa/index.html
EU Activates Cyber Rapid Response Team Amid Ukraine Crisis
https://www.bankinfosecurity.com/eu-activates-cyber-rapid-response-team-amid-ukraine-crisis-a-18584
Amid rapid escalation in the Russia-Ukraine conflict derived from historical grievances and qualms with Ukraine’s plan to join the military alliance NATO, the world’s network defenders remain on high alert. And on Tuesday, the European Union confirmed that it will activate its elite cybersecurity team to assist Ukrainians if Russian cyberattacks occur.
UK alludes to retaliatory cyber-attacks on Russia
https://therecord.media/uk-alludes-to-retaliatory-cyber-attacks-on-russia/
The UK government alluded yesterday that it might launch offensive cyber operations against Russia if the Kremlin attacks UK computer systems after an invasion of Ukraine.
Amazon: Charities, aid orgs in Ukraine attacked with malware
https://www.bleepingcomputer.com/news/security/amazon-charities-aid-orgs-in-ukraine-attacked-with-malware/
Charities and non-governmental organizations (NGOs) providing critical support in Ukraine are targeted in malware attacks aiming to disrupt their operations and relief efforts seeking to assist those affected by Russia’s war. Amazon has detected these attacks while working with the employees of NGOs, charities, and aid organizations, including UNICEF, UNHCR, World Food Program, Red Cross, Polska Akcja Humanitarna, and Save the Children.
Ransomware Used as Decoy in Destructive Cyberattacks on Ukraine
https://www.securityweek.com/ransomware-used-decoy-destructive-cyberattacks-ukraine
Destructive ‘HermeticWiper’ Malware Targets Computers in Ukraine
https://www.securityweek.com/destructive-hermeticwiper-malware-targets-computers-ukraine
Just as Russia was preparing to launch an invasion of Ukraine, Ukrainian government websites were disrupted by DDoS attacks and cybersecurity firms reported seeing what appeared to be a new piece of malware on hundreds of devices in the country.
The new malware, dubbed “HermeticWiper” by the cybersecurity community, is designed to erase infected Windows devices. The name references a digital certificate used to sign a malware sample — the certificate was issued to a Cyprus-based company called Hermetica Digital.
“At this time, we haven’t seen any legitimate files signed with this certificate. It’s possible that the attackers used a shell company or appropriated a defunct company to issue this digital certificate,” explained endpoint security firm SentinelOne, whose researchers have been analyzing the new malware.
The malware has also been analyzed by researchers at ESET and Symantec. Each of the companies has shared indicators of compromise (IoCs) associated with HermeticWiper.
ESET first spotted HermeticWiper on Wednesday afternoon (Ukraine time) and the company said hundreds of computers in Ukraine had been compromised.
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/
On February 23rd, the threat intelligence community began observing a new wiper malware sample circulating in Ukrainian organizations. Our analysis shows a signed driver is being used to deploy a wiper that targets Windows devices, manipulating the MBR resulting in subsequent boot failure. This blog includes the technical details of the wiper, dubbed HermeticWiper, and includes IOCs to allow organizations to stay protected from this attack. This sample is actively being used against Ukrainian organizations, and this blog will be updated as more information becomes available. Also:
https://www.welivesecurity.com/2022/02/24/hermeticwiper-new-data-wiping-malware-hits-ukraine/
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ukraine-wiper-malware-russia
https://www.bleepingcomputer.com/news/security/new-data-wiping-malware-used-in-destructive-attacks-on-ukraine/
HermeticWiper: A detailed analysis of the destructive malware that targeted Ukraine https://blog.malwarebytes.com/threat-intelligence/2022/03/hermeticwiper-a-detailed-analysis-of-the-destructive-malware-that-targeted-ukraine/
The day before the invasion of Ukraine by Russian forces on February 24, a new data wiper was unleashed against a number of Ukrainian entities. This malware was given the name “HermeticWiper” based on a stolen digital certificate from a company called Hermetica Digital Ltd. This wiper is remarkable for its ability to bypass Windows security features and gain write access to many low-level data-structures on the disk. In addition, the attackers wanted to fragment files on disk and overwrite them to make recovery almost impossible.
In Ukraine, Online Gig Workers Keep Coding Through the War
https://www.wired.com/story/gig-work-in-ukraine/
Freelancers or gig workers who piece together work on online platforms are a hidden engine of the Ukrainian economyand the world’s. They work as software engineers, project managers, IT technicians, graphic designers, editors, and copywriters. And they work for everyone.
Invading Russian forces have plunged freelancers’ home offices into chaos and uncertainty. Vlad, a video editor in southern Ukraine, says he’s grown accustomed to the air alarm signal, and hiding until it has passed. Now there are battles 30 miles from his home. “But as long as there is water, electricity, and internet, I can work, ” he says.
“Because we all need to live for something, eat
Leaving Russia? Experts Say Wipe Your Phone Before You Go
https://www.forbes.com/sites/thomasbrewster/2022/03/04/russians-escaping-putins-repression-urged-to-wipe-their-phones/
Russians fleeing President Vladimir Putin’s regime as it cracks down on anti-war sentimentand rumors of martial law grow louderare being advised to wipe their phones, especially of any traces of support for Ukraine. If they don’t, experts say they may face detention. They’re starting by deleting messages on Signal, Telegram or any app that promises security. For those leaving the country, they’re deleting the apps themselves, and urging others to do the same. Russian media has first-hand accounts of lengthy interrogations at the border, along with phone and laptop searches, though Forbes could not corroborate those claims.
Why ICANN Won’t Revoke Russian Internet Domains
The organization says cutting the country off would have “devastating” effects on the global internet system.
https://www.wired.com/story/why-icann-wont-revoke-russian-internet-domains/#intcid=_wired-bottom-recirc_8e802014-a05f-48c5-89e8-9dad931361ad_text2vec1-reranked-by-vidi
Ukraine on Monday asked ICANN to revoke Russian top-level domains such as .ru, .рф, and .su; to “contribute to the revoking for SSL certificates” of those domains; and to shut down DNS root servers in Russia. Fedorov argued that the requested “measures will help users seek for reliable information in alternative domain zones, preventing propaganda and disinformation.”
Ukraine’s request to cut Russia off from core parts of the internet has been rejected by the nonprofit group that oversees the Internet’s Domain Name System (DNS). CEO Göran Marby of the Internet Corporation for Assigned Names and Numbers (ICANN) said the group must “maintain neutrality and act in support of the global internet.”
“Our mission does not extend to taking punitive actions, issuing sanctions, or restricting access against segments of the internet—regardless of the provocations,” Marby wrote in his response to Ukraine Vice Prime Minister Mykhailo Fedorov.
https://www.icann.org/en/system/files/correspondence/marby-to-fedorov-02mar22-en.pdf
TikTok Was Designed for War
As Russia’s invasion of Ukraine plays out online, the platform’s design and algorithm prove ideal for the messiness of war—but a nightmare for the truth.
https://www.wired.com/story/ukraine-russia-war-tiktok/#intcid=_wired-bottom-recirc_8e802014-a05f-48c5-89e8-9dad931361ad_text2vec1-reranked-by-vidi
2,362 Comments
Tomi Engdahl says:
https://www.facebook.com/105517788913/posts/10159939214238914/
The chip shortage has just become much worse. 50% of the global production of neon gas required for all chip production comes from Ukrainian factories, which have now shut down.
But rather than complaining about delivery dates for products, shouldn’t we all take a step back and focus our thoughts and prayers on the Ukrainian people?
https://m.youtube.com/watch?v=SwcCC3tKZ3E&feature=youtu.be
Tomi Engdahl says:
China says U.S. addresses used its computers to launch cyberattacks on Russia, Ukraine
https://www.reuters.com/technology/chinas-has-faced-continuous-cyber-attacks-united-states-xinhua-2022-03-11/
SHANGHAI, March 11 (Reuters) – China has experienced continuous cyberattacks since February in which internet addresses in the United States have been used to seize control of Chinese computers to target Belarus, Russia and Ukraine, state news agency Xinhua said on Friday.
Reporting by Brenda Goh; Editing by Christopher Cushing and Kenneth Maxwell
Tomi Engdahl says:
Venäjä kansallistaa ulkomailta vuokratut lentokoneet – vuokrattujen koneiden arvo on yli 10 miljardia dollaria
Ulkomaiset yritykset ovat vuokranneet Venäjälle yli 500 lentokonetta. Venäjälle jääneiden koneiden arvoksi on arvioitu yli 10 miljardia dollaria.
https://www.hs.fi/talous/art-2000008673724.html
Tomi Engdahl says:
https://www.snopes.com/fact-check/did-pornhub-block-russian-users/
Tomi Engdahl says:
https://www.politico.eu/article/estonia-nato-base-troop-vladimir-putin-next-move/
Tomi Engdahl says:
https://www.aljazeera.com/news/2022/2/28/russia-ukraine-crisis-in-maps-and-charts-live-news-interactive
Tomi Engdahl says:
Ukrainan somesotaa käyvät viraali presidentti, 31-vuotias ministeri ja tv-käsikirjoittajat – asiantuntija: “Heille täytyy antaa tunnustusta taidoistaan”
Koko Ukrainan kansa on valjastanut sosiaalisen median aseekseen. Tämä ei ole sattumaa. Suomi voisi ottaa Ukrainasta oppia, sanoo asiantuntija.
https://yle.fi/uutiset/3-12353824
Tomi Engdahl says:
Using a New Cyber Tool, Westerners Have Been Texting Russians About the War in Ukraine
Website developed by hackers is new initiative in West’s battle to counter Russia’s propaganda campaign
https://www.wsj.com/articles/using-a-new-cyber-tool-westerners-have-been-texting-russians-about-the-war-in-ukraine-11647100803
People around the world are using a new website to circumvent the Kremlin’s propaganda machine by sending individual messages about the war in Ukraine to random people in Russia.
The website was developed by a group of Polish programmers who obtained some 20 million cellphone numbers and close to 140 million email addresses owned by Russian individuals and companies. The site randomly generates numbers and addresses from those databases and allows anyone anywhere in the world to message them, with the option of using a pre-drafted message in Russian that calls on people to bypass President Vladimir Putin’s censorship of the media.
Tomi Engdahl says:
Putin Has Touted An Invincible Nuclear Weapon That Really Exists – Here’s How It Works And Why It Deeply Worries Experts
https://www.iflscience.com/technology/putin-has-touted-an-invincible-nuclear-weapon-that-really-exists-heres-how-it-works-and-why-it-deeply-worries-experts/
Tomi Engdahl says:
Hundreds of thousands of Ukrainian technology workers have taken part in cyberattacks against Russia’s government, media and financial institutions in recent days, a top Ukrainian cybersecurity official said.
Ukraine’s ‘IT Army’ Has Hundreds of Thousands of Hackers, Kyiv Says
https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-03-04/card/ukraine-s-it-army-has-hundreds-of-thousands-of-hackers-kyiv-says-RfpGa5zmLtavrot27OWX?mod=e2fb
Tomi Engdahl says:
Good analysis & read “how it is going (to be)”. References to Fin – Rus war are interesting.
https://euromaidanpress.com/2022/03/11/ukraines-strategy-in-russian-invasion-is-similar-to-finlands-winter-war/
Tomi Engdahl says:
‘Not the time to go poking around’: How former U.S. hackers view dealing with Russia
People with experience in U.S. hacking operations say they expect both Washington and Moscow to show caution in how they wield their digital weapons.
https://www.politico.com/news/2022/03/12/cyber-russia-hacking-security-00016598
The CIA and NSA have spent years burrowing into Russia’s critical computer networks to collect intelligence — and acquire access that President Joe Biden could seize on to order destructive cyberattacks on Vladimir Putin’s regime.
But for now, the United States’ most likely approach is to tread slowly and carefully toward any cyber conflict with Russia, three experts with experience in U.S. hacking operations told POLITICO — while hoping the Russians do the same.
Fears of cyber warfare between the two former Cold War rivals have become a recurring concern amid Russia’s invasion of Ukraine, prompting Biden to warn that he would “respond the same way” to any hostile hacking from Moscow against the United States. But people with experience in U.S. cyber strategy say neither side is likely to leap to destructive attacks as a first move — and any hard punch would be preceded by warnings and signals.
“There’s gradations before you get to disrupting critical infrastructure,” said Michael Daniel, who was the National Security Council’s cybersecurity coordinator during the Obama administration.
The U.S. also would most likely avoid going after civilian targets such as Russian citizens’ electricity, even in response to Russian cyberattacks on the United States or NATO. Instead, any U.S. action would be gradual, proportional and aimed at warning Russia to stop
“Are they going to take down the power grid [in Moscow]? No,” said Lee, who is now CEO of the cybersecurity firm Dragos. He added: “You’re [just] trying to shape behavior and signal, ‘Hey we see you, and we’re willing to escalate this. Please don’t punch back or we’ll go to the next phase.”
Tomi Engdahl says:
Pääkirjoitus: Putinin sotahinnat kirpaisevat – ja vaativat Suomenkin hallitukselta talouspoliittisia vastatoimia https://www.is.fi/paakirjoitus/art-2000008679001.html
Tomi Engdahl says:
Ukrainian President Zelensky pressured companies for the first time on social media—targeting Microsoft, Oracle and SAP to do more to punish Russia. (Oracle responded, saying it had done all it could do.)
Zelensky Presses Companies—Microsoft, SAP And Oracle—To Punish Russia More
https://lm.facebook.com/l.php?u=https%3A%2F%2Ftrib.al%2F8goh8Jc&h=AT0EaYP33d_hZX9LbYiUM8Jewvz9rZcZRJPsxWpCCipQzNxYDT_JAiASrzhEQWADrruOHMZMDZjNgA4OVdQxVwzjFNuAp7U8x5wxuwlghiFwhQuvpuf8bDQI6ZBPvXrp3Q
Tagging Microsoft, Oracle and SAP’s official accounts, Zelensky tweeted Sunday the technology companies must “stop supporting” their Russian products, asserting the company’s Russian pullbacks were “‘half’ decisions.’”
Earlier this month, Microsoft announced the suspension of new sales in Russia, Oracle said it “suspended all operations” in the country and SAP said it was “stopping business in Russia aligned with sanctions” and pausing all sales, joining dozens of international companies in severing business ties with Russia.
Tomi Engdahl says:
Bidenin neuvonantaja varoittaa Kiinaa seurauksista, jos maa auttaa Venäjää https://www.is.fi/ulkomaat/art-2000008679529.html
Tomi Engdahl says:
Näin pääset viranomaispalveluihin, kun pankkitunnukset eivät toimi – mieti, ottaisitko käyttöön https://www.is.fi/digitoday/tietoturva/art-2000008672427.html
Tomi Engdahl says:
Report: Recent 10x Increase in Cyberattacks on Ukraine https://krebsonsecurity.com/2022/03/report-recent-10x-increase-in-cyberattacks-on-ukraine/
Bill Woodcock is executive director at Packet Clearing House, a nonprofit based in San Francisco that is one of several sponsors of Quad9. Woodcock said the spike in blocked DNS queries coming out of Ukraine clearly shows an increase in phishing and malware attacks against Ukrainians. “They’re being targeted by a huge amount of phishing, and a lot of malware that is getting onto machines is trying to contact malicious command-and-control infrastructure, ” Woodcock said.
Tomi Engdahl says:
Ukrainassa toimivia avustusjärjestöjä vastaan isketään haittaohjelmilla ruoan ja lääkkeiden toimitus vaikeutuu https://www.tivi.fi/uutiset/tv/7a3a7d46-cc0d-4711-ba82-cc79c7c7549f
Amazon Web Services ilmoittaa huomanneensa useita haittaohjelmia, jotka on kohdennettu Ukrainassa humanitääristä apua antavia järjestöjä vastaan. Pahimmissa tapauksissa haittaohjelmat ovat vaikuttaneet lääketieteellisten tarvikkeiden, ruoan ja vaatteiden toimittamiseen.
Tomi Engdahl says:
Aikooko Venäjä todella irtautua koko internetistä, ja mitä se tarkoittaisi viisi kysymystä ja vastausta
https://yle.fi/uutiset/3-12353139
Maailma odottaa jälleen Venäjän seuraavaa tekoa. Kytkeekö se itsensä irti maailmanlaajuisesta internetistä?. Maailmalla spekuloidaan, että Venäjällä olisi tähän halua ja valmiutta jo tällä viikolla tai seuraavalla. Monet nettipalvelut ovat lopettaneet toimintansa Venäjällä, ja maa saattaa olla siirtymässä sotatilaan. Mistä on kyse?
Haimme vastauksia neljältä asiantuntijalta. myös:
https://www.tivi.fi/uutiset/tv/048b63f6-9b68-4cb8-80d4-c057c21f490c – Näin Venäjä irtoaisi internetistä pystyykö modeemi kiertämään muurin?
Tomi Engdahl says:
Russia bans Instagram, a week after blocking Facebook, Twitter https://www.bleepingcomputer.com/news/technology/russia-bans-instagram-a-week-after-blocking-facebook-twitter/
Russian Internet watchdog Roskomnadzor announced that Instagram will also be banned in Russia one week after blocking the Facebook and Twitter social networks. “As you know, on March 11, Meta Platforms Inc. made an unprecedented decision by allowing the posting of information containing calls for violence against Russian citizens on its social networks Facebook and Instagram, ” the Russian Internet watchdog said. myös:
https://www.is.fi/digitoday/art-2000008676248.html – Venäjä aikoo estää Whatsappin ja Instagramin käytön Interfax: Syyttäjät pyytävät nimeämään Metan “äärijärjestöksi”
Tomi Engdahl says:
Big Web Security Firms Ditch Russia, Leaving Internet Users Open To More Kremlin Snooping https://www.forbes.com/sites/thomasbrewster/2022/03/11/russians-exposed-to-more-surveillance-and-cybercrime-as-web-security-giants-leave-over-ukraine-invasion/
The departure of the two companies, Avast, a $6 billion antivirus provider based in the Czech Republic, and Utah-based website-certification firm DigiCert, will further isolate the country of 145 million people. “We are horrified at Russia’s aggression against Ukraine, where the lives and livelihoods of innocent people are at severe risk, and where all freedoms have come under attack, ”
Avast CEO Ondrej Vlcek wrote on Thursday.
Tomi Engdahl says:
As Russia Invaded, Hackers Broke Into A Ukrainian Internet Provider.
Then Did It Again As Bombs Rained Down
https://www.forbes.com/sites/thomasbrewster/2022/03/10/cyberattack-on-major-ukraine-internet-provider-causes-major-outages/
A major Ukrainian internet service provider says it was hacked twice.
Sources tell Forbes that the first hack was in February, the second on March 9, and that the hackers managed to reset devices to factory settings.
Tomi Engdahl says:
Ukraine’s internet infrastructure struggles as Russian invasion continues https://therecord.media/ukraines-internet-infrastructure-struggles-as-russian-invasion-continues/
Ukraine’s internet networks have suffered increasing disruptions in recent days as Russia continues its assault on the country threatening to sever Ukraine’s ability to court diplomatic allies online and share images of apparent attacks on civilian targets, including hospitals.
Tomi Engdahl says:
Ukraine invasion: We should consider internet sanctions, says ICANN ex-CEO https://www.theregister.com/2022/03/10/internet_russia_sanctions/
The former head of ICANN, two EU parliamentarians, and a handful of technical, security, and legal experts on Thursday plan to publish an open letter to the internet governance community arguing that the time has come to develop a targeted internet sanctions system.
Tomi Engdahl says:
20 terabytes: Anonymous Germany hijacks data from Rosneft Germany https://anonleaks.net/en/2022/anonymous-germany/20-terabytes-anonymous-germany-hijacks-data-from-rosneft-germany/
Hacktivists gained access to the servers of Rosneft Deutschland, a subsidiary of the Russian oil company
Tomi Engdahl says:
Exclusive: U.S. spy agency probes sabotage of satellite internet during Russian invasion, sources say https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/
Western intelligence agencies are investigating a cyberattack by unidentified hackers that disrupted broadband satellite internet access in Ukraine coinciding with Russia’s invasion, according to three people with direct knowledge of the incident. The hackers disabled modems that communicate with Viasat Inc’s KA-SAT satellite, which supplies internet access to some customers in Europe, including Ukraine. More than two weeks later some remain offline, resellers told Reuters.
Tomi Engdahl says:
Why Russia’s “disconnection” from the Internet isn’t amounting to much https://arstechnica.com/information-technology/2022/03/why-russias-disconnection-from-the-internet-isnt-amounting-to-much/
Rumors of Russian Internet services degrading have been greatly exaggerated, despite unprecedented announcements recently from two of the world’s biggest backbone providers that they were exiting the country following its invasion of Ukraine.
Tomi Engdahl says:
Ukrainan somesotaa käyvät viraali presidentti, 31-vuotias ministeri ja tv-käsikirjoittajat asiantuntija: “Heille täytyy antaa tunnustusta taidoistaan”
https://yle.fi/uutiset/3-12353824
Koko Ukrainan kansa on valjastanut sosiaalisen median aseekseen. Tämä ei ole sattumaa. Suomi voisi ottaa Ukrainasta oppia, sanoo asiantuntija.
Tomi Engdahl says:
ESET Research webinar: How APT groups have turned Ukraine into a cyberbattlefield https://www.welivesecurity.com/2022/03/11/eset-research-webinar-apt-groups-ukraine-cyber-battlefield/
Ukraine has been under cyber-fire for years now here’s what you should know about various disruptive cyberattacks that have hit the country since 2014
Tomi Engdahl says:
Anonymous sent 7 million texts to Russians plus hacked 400 of their security cams https://www.hackread.com/anonymous-sent-texts-to-russians-hacked-security-cams/
Anonymous and its affiliate groups have sent 7 million text messages to Russian citizens about the war in Ukraine while another group has hacked 400+ security cameras in the country with anti-war messages.
Tomi Engdahl says:
Voiko Venäjä luoda digitaalisen “rautaesiripun”? Asiantuntija kertoo, mitä irtautuminen internetistä tarkoittaisi
https://www.mtvuutiset.fi/artikkeli/voiko-venaja-luoda-digitaalisen-rautaesiripun-asiantuntija-kertoo-mita-irtautuminen-internetista-tarkoittaisi/8377460
Sotatoimien jatkuessa ja laajetessa Ukrainassa Venäjä uhkailee digitaalisella rautaesiripulla. Venäjä on kertonut valmiudestaan irtautua maailmanlaajuisesta internetistä. Asiantuntijan mukaan se olisi täysin mahdollista. – Verkkoyhteyksiä ja verkossa olevia palveluita voidaan ottaa irti verkosta, kertoo yksikönpäällikkö Heidi Kivekäs Kyberturvallisuuskeskukselta.
Tomi Engdahl says:
Nato-keskustelun voi odottaa lisäävän Venäjän voimakasta hybridivaikuttamista Suomessa
https://yle.fi/uutiset/3-12356957
Limnéll uskoo, että edessä on entistä voimakkaampia hybridivaikuttamisen muotoja. Hän on itse luokitellut kuusi mahdollista vaikuttamisen tapaa. Kolmantena hän nostaa kybermaailman, jota hän kuvaa informaatiovaikuttamisen lisäksi hybridivaikuttamisen “keihäänkärjiksi”. – Kyberuhat voivat olla moninaisia. Ne voivat olla esimerkiksi erilaisten yhteiskunnan sähköisten palveluiden toimintahäiriöitä. Erityisesti Limnéll nostaa esille terveydenhuollon alan, jossa jaetaan sensitiivistä tietoa.
Tomi Engdahl says:
Ukraina kehitti uuden aseen: Polttopulloja pudottava lennokki – katso kuvat
Polttopulloja on valmistettu Ukrainassa vapaaehtoisvoimin sodan alusta lähtien. Nyt maan armeija näyttää keksineen tavan käyttää pulloja myös pidemmän kantaman päästä.
https://www.iltalehti.fi/ulkomaat/a/63162ad5-5a35-466a-a52f-31dec6fc78e2
Tomi Engdahl says:
Pääkirjoitus: Putin joutui nöyryytetyksi – onko tämä se porukka, jossa Suomi haluaa odottaa hänen seuraavaa siirtoaan?
Valtteri Varpela
Venäjä käy sotaa, koska se on ainut tapa saada maalle painoarvoa tai vaikutusvaltaa nykymaailmassa, kirjoittaa uutispäätoimittaja Valtteri Varpela.
https://www.iltalehti.fi/paakirjoitus/a/1bf1664a-2a5f-45a9-9bf6-9a3e82979fef
Tomi Engdahl says:
Russian Cyber Restraint in Ukraine Puzzles Experts
https://www.securityweek.com/russian-cyber-restraint-ukraine-puzzles-experts
The absence of any crippling Russian cyberattacks against Ukraine is puzzling experts, but they warn that low-level assaults may be coming, including against the West in retaliation for sanctions.
Even before Russian troops poured across the border into Ukraine last month, Western observers had warned of massive attacks on Ukraine’s IT infrastructure, likely launched by Russian government agents or, by proxy, private hackers which give the government plausible deniability.
The entire range of cyberattacks is within Russia’s capabilities, from blocking banking systems, shutting down power grids and cutting the water supply, to sabotaging communication networks.
Hackers close to the government have in the past targeted corporate IT structures, government websites, planted ransomware and plundered sensitive data as part of espionage efforts, experts say. But in the war against Ukraine, the order for all out cyber-war does not appear to have been given or, if it was, has not translated into much success.
- ‘You don’t burn it down’ -
The most likely explanation is that Russia had been hoping for a quick victory without needing to resort to sophisticated and hugely damaging cyberattacks that require long preparation, according to Jason Blessing, a cybersecurity expert at the American Enterprise Institute (AEI).
“Strategic context is critical for unpacking the use of cyber operations,” he said.
Tomi Engdahl says:
Kiinan mukaan yhdysvaltalaistiedot Venäjän apupyynnöistä ovat ”disinformaatiota” – Ukraina: 90 lasta kuollut sodassa
https://www.is.fi/ulkomaat/art-2000008608788.html
Tomi Engdahl says:
Venäjällä on internetissään massiivinen ongelma – näin sitä yritetään kiertää
https://www.is.fi/digitoday/art-2000008679983.html
Vanhentuvat salausvarmenteet laittavat Venäjän verkon tiukille. Maa alkaa myöntää omia varmenteitaan, mutta se ei ole ongelmatonta.
Venäjään kohdistuneet pakotteet ovat ajaneen maan internetin ahtaalle. Venäläisille verkkosivuille ei myönnetä enää varmenteita. Venäjä yrittää ratkaista ongelmaa perustamalla oman varmenteita myöntävän tahon eli CA:n (certificate authority), kertoo Bleeping Computer.
Russia creates its own TLS certificate authority to bypass sanctions
https://www.bleepingcomputer.com/news/security/russia-creates-its-own-tls-certificate-authority-to-bypass-sanctions/
Tomi Engdahl says:
Venäjä valmistautuu internetistä irtautumiseen
https://www.is.fi/digitoday/art-2000008671806.html
Sotatieteiden tohtorin mukaan se, että venäläiset pystyisivät operoimaan omassa verkossaan pidempiä aikoja kunnolla, on vielä vuosien päässä.
Ukrainan laajamittaiseksi pahentuneen sodan myötä huhut Venäjän alkuperäistä suunnitelmaa nopeammasta maailmanlaajuisesta internetistä irrottautumisesta ovat vahvistuneet.
Internetistä irtautuminen perustuisi järjestelmiin, joista osa on tarkoitettu maan sisäisen verkkoliikenteen eli omien kansalaisten valvontaan. Tähän liittyen muun muassa anonymiteetti sekä vpn-yhteyksien käyttö pyritään estämään.
– Käyttäjiä on vaadittu rekisteröitymään omilla henkilökohtaisilla tiedoillaan erilaisiin palveluihin. On myös vaadittu keskustelu- ja somealustojen keskustelujen valvomista ja käyttäjiltä oikeiden nimien käyttämisen edellyttämistä, sotatieteiden tohtori Juha Kukkola taustoittaa.
Laki myös vaatii, että venäläiset internet-palveluntarjoajat keräävät kaiken maan sisäisen verkkoliikenteen määräajaksi talteen datakeskuksiin.
Kukkola pitää merkittävänä myös Roskomnadzor-viestintäviranomaisen operoimaa sensuurimekanismia. Käytännössä Roskomnadzor ylläpitää mustaa listaa, jolle voidaan lisätä ip-osoitteita ja verkkosivuja. Palveluntarjoajat on velvoitettu estämään pääsy kyseisille sivustoille. Roskomnadzor voi lisäksi määrätä sivuja blokattaviksi pelkällä hallinnollisella päätöksellä.
Sensuurijärjestelmä kytkeytyy verkkoliikenteen rajoittamisjärjestelmään, jonka pohjalle verkon irtikytkeminen voitaisiin rakentaa.
– Viimeisen parin vuoden aikana venäläiset palveluntarjoajat ovat joutuneet sijoittamaan määrättyihin kohtiin omaa verkkoinfrastruktuuriaan laitteita, joiden avulla Roskomnadzor voi rajoittaa määrättyä liikennettä alkaen vaikkapa Twitterin liikenteen hidastamisesta tai kokonaan estämisestä.
Siten voidaan toteuttaa verkon katkaisu määrätyllä tasolla, vaikka kyse on itse asiassa liikenteen estämisestä.
Osa toimista tähtää kriittisen infrastruktuurin suojeluun. Venäjä on pyrkinyt kahdentamaan kaikki internetin toimivuuden kannalta tärkeät palvelut. Jos pääsy kyseisiin palveluihin katkeaa, Venäjällä on omat kopiot ja maan sisäinen internetliikenne toimii edelleen riippumatta ulkomaisista palvelimista. Kyse on esimerkiksi nimipalvelimista ja niiden rekistereistä.
Verkon sulkeminen edellyttää myös venäläisiä ohjelmistoja. Jos yhteydet ulkomaailmaan katkaistaan, samalla menetetään myös kansainvälisten yritysten, vaikkapa Microsoftin, tuotetuki. Ongelmaa on yritetty paikata aloittamalla venäläisten käyttöjärjestelmien ja ohjelmistoperheiden rakentaminen.
Se, että venäläiset pystyisivät operoimaan omassa verkossaan pidempiä aikoja kunnolla, on Kukkolan mukaan vielä vuosien päässä. Varsinkin asian tekninen puoli on pahasti kesken.
– Venäläisten oma tavoite, joka sekin oli kunnianhimoinen ja lausuttiin ennen Ukrainan sotaa, oli vuoteen 2024 tai 2026 mennessä.
Venäjän kyberomavaraisuus eli kyky ylläpitää itse ohjelmistoja ja laitteistoja pitkiä aikoja on toistaiseksi rajallinen. Myös kahdennusjärjestelmien rakentaminen on vielä vaiheessa.
Tomi Engdahl says:
Voivatko nämä asiat olla totta? Venäjän tiedustelun hädästä julkaistiin lisää väitettyjä paljastuksia – sotilasasiantuntija kommentoi
Venäjän tiedustelupalvelun työntekijänä esiintyvä henkilö on vuotanut jo neljä väitettyä kirjettä. Kirjeiden aitoutta ei ole pystytty varmistamaan.
https://www.iltalehti.fi/ulkomaat/a/cc02f286-6492-461a-9013-37f309bf2d55
This war will be a total failure, FSB whistleblower says
https://www.thetimes.co.uk/article/this-war-will-be-a-total-failure-fsb-whistleblower-says-wl2gtdl9m
Spies in Russia’s infamous security apparatus were kept in the dark about President Putin’s plan to invade Ukraine, according to a whistleblower who described the war as a “total failure” that could be compared only to the collapse of Nazi Germany.
A report thought to be by an analyst in the FSB, the successor agency to the KGB, said that the Russian dead could already number 10,000. The Russian defence ministry has acknowledged the deaths of only 498 of its soldiers in Ukraine.
Tomi Engdahl says:
Historiallinen myrkkycocktail romahdutti Venäjän talouden
Suomen Pankin Olli Rehn: ”Tavallisen venäläisen elintaso laskee rajusti, kun ruplan arvo on romahtanut, pankkijärjestelmä natisee, työttömyys nousee ja tuonti lännestä kuihtuu”.
https://www.iltalehti.fi/politiikka/a/3cb2a2fe-52b9-4ce4-bff5-5734794096b2
Venäjän talous on syöksynyt parissa viikossa pahimpaan pudotukseen sitten Neuvostoliiton hajoamisen.
Tutkimuspäällikkö Iikka Korhonen Suomen Pankista esitteli perjantaina pankin tiedotustilaisuudessa, mistä aineksista Venäjän talouden myrkkycocktail on tehty.
Korhonen kuvaa ruplan romahdusta ”erittäin merkittäväksi.” Vielä tammikuussa dollari maksoi noin 75 ruplaa, nyt 135 ruplaa.
– Tavallisen venäläisen elintaso laskee rajusti, kun ruplan arvo on romahtanut, pankkijärjestelmä natisee, työttömyys nousee ja tuonti lännestä kuihtuu, etenkin elektroniikan ja teknologian tuonti, SP:n pääjohtaja Olli Rehn summasi omassa esityksessään.
”Yksikään venäläinen lentoyhtiö ei lennä muualle kuin Minskiin”
Lännen Venäjälle asettamat vientikiellot koskevat korkeaa teknologiaa, kaksikäyttötuotteita eli tuotteita, jotka soveltuvat normaalin siviilikäytön lisäksi myös sotilaallisiin tarkoituksiin sekä lentokoneita ja niiden osia.
– Käytännössä kohta ollaan tilanteessa, jossa Venäjällä ei toimi edes kotimaan lentoliikenne, Korhonen sanoi.
Yhdysvaltain kielto viedä Venäjälle puolijohteita, joiden valmistamisessa on käytetty yhdysvaltalaisia koneita ja/tai ohjelmistoja, tulee Korhosen mukaan estämään erittäin tehokkaasti monien teknologiatuotteiden, kuten esimerkiksi matkapuhelinten viennin Venäjälle.
– Tämä vaikeuttaa merkittävästi myös Venäjän sotateollisuuden toimintaa. Merkittävä osa sen koneista ja laitteista on toimitettu ulkomailta, Korhonen sanoi.
Suurin osa länsimaista on kieltänyt venäläisten lentokoneiden ylilennot omassa ilmatilassaan.
– Lentokieltojen seurauksena Moskovasta voi tällä hetkellä lentää käytännössä vain Minskiin, Istanbuliin, Pakistaniin, Intiaan ja Keski-Aasiaan, Korhonen sanoi.
– Ja yksikään venäläinen lentoyhtiö ei lennä muualle kuin Minskiin, hän lisäsi heti perään.
Pakotteiden vaikutusta täydentävät eri maiden kansalaisten ja yritysten vapaaehtoiset toimet.
Tomi Engdahl says:
Russians try to sell Big Macs for around $36 each and a McDonald’s paper bag for more than $300, following the closure of branches
https://news.yahoo.com/russians-trying-sell-big-macs-122120599.html
Tomi Engdahl says:
Bermuda Revokes Russian Aircraft Airworthiness, And Why It Matters
https://onemileatatime.com/news/bermuda-revokes-russian-aircraft-airworthiness/?utm_campaign=coschedule&utm_source=facebook_page&utm_medium=One%20Mile%20at%20a%20Time&utm_content=Bermuda%20Revokes%20Russian%20Aircraft%20Airworthiness,%20And%20Why%20It%20Matters
Bermuda has just suspended the airworthiness certificates of all Bermuda-registered jets in Russia. This might seem random given all the sanctions that Russia is facing, but this is more significant than you might think… sort of.
Many Russian planes are registered in Bermuda
As of March 13, 2022, the Bermuda Civil Aviation Authority (BCAA) has provisionally suspended all certificates of airworthiness of Bermuda-registered aircraft operating in Russia. The reason this matters is because roughly half of the commercial jets in Russia are registered in Bermuda (including a majority of the planes that are leased).
International sanctions make it hard for Bermuda to maintain safety oversight of these Russian operated aircraft, meaning that Bermuda can no longer confidently verify that these aircraft are airworthy.
Tomi Engdahl says:
https://www.reuters.com/business/aerospace-defense/bermuda-revokes-licences-russian-operated-planes-over-safety-concerns-2022-03-13/
Tomi Engdahl says:
https://www.reuters.com/business/aerospace-defense/bermuda-revokes-licences-russian-operated-planes-over-safety-concerns-2022-03-13/
https://www.themoscowtimes.com/2022/03/13/bermuda-suspends-licenses-for-hundreds-of-russian-aircraft-a76907
Tomi Engdahl says:
Venäjän valtion tutkimuslaitos väittää: Putinin suosio ja ”erikoisoperaation” kannatus kasvavat kohisten https://www.is.fi/ulkomaat/art-2000008679698.html
Tomi Engdahl says:
Venäjä käyttää Ukrainan sodassa ydinasetta pelotteluun ja painostamiseen
Venäjän presidentti Vladimir Putin on varoittanut länttä sekaantumasta Ukrainan sotaan ja muistuttanut maansa vahvoista ydinaseista. Länsi ei halua lähteä hermopeliin mukaan.
https://www.hs.fi/paakirjoitukset/art-2000008673184.html
Tomi Engdahl says:
Näin hakkerit ujuttavat tietoa Venäjälle nyt – jo kymmeniä miljoonia viestejä lähetetty https://www.is.fi/digitoday/art-2000008681031.html
Tomi Engdahl says:
Ukraine Halts Output of Neon Gas, Chip Production at Risk
By Anton Shilov published 3 days ago
For now, chipmakers have enough high-purity.
https://www.tomshardware.com/uk/news/ukraine-neon-gas-production
Tomi Engdahl says:
https://www.thetechoutlook.com/news/ukraine-russia-war-ukrainian-farmer-steals-soyuz-rocket/
Tomi Engdahl says:
Ukraine has started using Clearview AI’s facial recognition during war
https://www.itnews.com.au/news/ukraine-has-started-using-clearview-ais-facial-recognition-during-war-577347?utm_source=desktop&utm_medium=facebook&utm_campaign=share
To uncover Russian assailants, combat misinformation and identify the dead.
Ukraine’s defense ministry began using Clearview AI’s facial recognition technology, the company’s chief executive told Reuters, after the US startup offered to uncover Russian assailants, combat misinformation and identify the dead.
Ukraine is receiving free access to Clearview AI’s powerful search engine for faces, letting authorities potentially vet people of interest at checkpoints, among other uses, added Lee Wolosky, an adviser to Clearview and former diplomat under US presidents Barack Obama and Joe Biden.
Clearview said it had not offered the technology to Russia, which calls its actions in Ukraine a “special operation.”
The Clearview founder said his startup had more than 2 billion images from the Russian social media service VKontakte at its disposal, out of a database of over 10 billion photos total.
That database can help Ukraine identify the dead more easily than trying to match fingerprints and works even if there is facial damage, Ton-That wrote.
The VKontakte images make Clearview’s dataset more comprehensive than that of PimEyes, a publicly available image search engine that people have used to identify individuals in war photos, Wolosky said.