Cyber security news February 2022

This posting is here to collect cyber security news in February 2022.

I post links to security vulnerability news to comments of this article.

You are also free to post related links to comments.

511 Comments

  1. Tomi Engdahl says:

    Microsoft: Ukraine hit with new FoxBlade malware hours before invasion
    https://www.bleepingcomputer.com/news/security/microsoft-ukraine-hit-with-new-foxblade-malware-hours-before-invasion/

    Microsoft said that Ukrainian networks were targeted with newly found malware several hours before Russia’s invasion of Ukraine on February 24th.

    Researchers with the Microsoft Threat Intelligence Center (MSTIC) observed destructive attacks targeting Ukraine and spotted a new malware strain they dubbed FoxBlade.

    “Several hours before the launch of missiles or movement of tanks on February 24, Microsoft’s Threat Intelligence Center (MSTIC) detected a new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure,” Microsoft President and Vice-Chair Brad Smith said.

    “We immediately advised the Ukrainian government about the situation, including our identification of the use of a new malware package (which we denominated FoxBlade), and provided technical advice on steps to prevent the malware’s success.”

    Microsoft describes the malware in a Security Intelligence advisory published on February 23rd as a trojan that can use computers “for distributed denial-of-service (DDoS) attacks” without the owners’ knowledge.

    These recently spotted and still active cyberattacks “have been precisely targeted,” Smith also revealed.

    Earlier this month, newly discovered HermeticWiper malware was used to target Ukraine together with ransomware decoys to wipe data and render devices unbootable.

    In January, the country was struck by another series of malware attacks deploying the WhisperGate wiper disguised as a ransomware payload.

    Over the weekend, CISA and the FBI warned US organizations that the data wiping attacks against Ukraine could spill over to other countries, urging US orgs to “increase vigilance” and reinforce their defenses.

    The same day, Ukraine’s Vice Prime Minister Mykhailo Fedorov also revealed the creation of an “IT army” to help the country “fight on the cyber front.”

    Reply
  2. Tomi Engdahl says:

    CISA and FBI warn of potential data wiping attacks spillover
    https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-potential-data-wiping-attacks-spillover/

    The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned US organizations that data wiping attacks targeting Ukraine could spill over to targets from other countries.

    The two federal agencies issued this warning in the form of a joint cybersecurity advisory published over the weekend following the unwarranted Russian invasion of Ukraine.

    Although the two malware strains have only been deployed against Ukrainian networks so far, the threat actors deploying them could also accidentally hit other targets, and US organizations should be ready to prevent such devastating attacks.

    Reply
  3. Tomi Engdahl says:

    The teen famous for tracking Elon Musk’s jet has a new target: Russian oligarchs
    https://lm.facebook.com/l.php?u=https%3A%2F%2Ftrib.al%2F0tnhW5L&h=AT2bJjjsBQEa4Pf-aHEKYUJgPxKanwlDpXdCzVJMkLVFzgoi1DTU9D6wsXyFPyDSBXbsJ390P1BPHMusSTr7Kb6PC8CDHDvSc3utIPgx0ZU3hJT-G-tIjSR8qLcLoIR-4sSBdypf9svc3OIGfw

    A new Twitter account called Russian Oligarch Jets is tracking the air travel of Russia’s elite.
    The automated account was formed following US sanctions against members of Putin’s inner circle.
    The teen who made headlines for tracking Elon Musk’s private jet travel is behind this new account.

    A new account, called Russian Oligarch Jets, has started tracking the whereabouts of some of Russia’s wealthiest businessmen, posting when and where their aircraft takes off and lands. The automated feed posted its first tweet on Sunday after the US sanctioned several members of Russian President Vladimir Putin’s inner circle and pledged to hunt down and freeze their assets, including their yachts and mansions. 

    https://mobile.twitter.com/RUOligarchJets

    Reply
  4. Tomi Engdahl says:

    Ukrainan ulkoministeri: Venäjä levittää Ukrainasta perätöntä ydinaseväitettä https://www.iltalehti.fi/ulkomaat/a/12b25895-3816-4f90-b8d5-c4fb192235b9

    Reply
  5. Tomi Engdahl says:

    Länsi ryhdistäytyi Venäjän edessä, tämä tietää hyvää Suomellekin https://www.iltalehti.fi/paakirjoitus/a/29456a1f-57ad-4545-a39d-3535f0b4694f

    Reply
  6. Tomi Engdahl says:

    Rautaiset sukukalleudet kertovat rohkeudesta, mutta Zelenskyin suurin ansio on strateginen viisaus https://www.iltalehti.fi/paakirjoitus/a/bd7104dd-7f08-46ed-a966-807dff0e67c9

    Reply
  7. Tomi Engdahl says:

    Historiallisen yhtenäinen EU murskasi Vladimir Putinin kuvitelman rivien hajoamisesta – näin se tapahtui https://www.iltalehti.fi/ulkomaat/a/a0d7100c-2141-4a6b-9da2-753a261d95b5

    Reply
  8. Tomi Engdahl says:

    “I am sure we deserve this” — Ukrainian President Volodymyr Zelenskiy asks the EU to immediately accept his country into the bloc

    Reply
  9. Tomi Engdahl says:

    Zelensky signed an application for #Ukraine’s membership in the #European Union.
    https://mobile.twitter.com/nexta_tv/status/1498327028382240777

    Reply
  10. Tomi Engdahl says:

    Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage
    New research by the Symantec Threat Hunter team, part of Broadcom Software, has uncovered a highly sophisticated piece of malware being used by China-linked threat actors, exhibiting technical complexity previously unseen by such actors. The malware appears to be used in a long-running espionage campaign against select governments and other critical infrastructure targets. There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China.. Also:
    https://www.bleepingcomputer.com/news/security/chinese-cyberspies-target-govts-with-their-most-advanced-backdoor/.
    https://www.cisa.gov/uscert/ncas/current-activity/2022/02/28/broadcom-software-discloses-apt-actors-deploying-daxin-malware

    Reply
  11. Tomi Engdahl says:

    How the Eastern Europe Conflict Has Polarized Cyberspace https://blog.checkpoint.com/2022/02/27/how-the-eastern-europe-conflict-polarized-cyberspace/
    The war between Russia and Ukraine is advancing. People everywhere are deciding who they will support. The same dynamic happens in the cyberspace. Hacktivists, cybercriminals, white hat researchers or even technology companies are picking a clear side, emboldened to act on behalf of their choices. Historically, Russia has had superiority over Ukraine in the cyberspace. And last week, Ukraine was attacked by destructive wiping malware. However, the situation is starting to change, as most of the non-nation cyber state actors are taking the side of Ukraine. To defend itself, the Ukrainian government has created an international IT army of hacktivists.

    Reply
  12. Tomi Engdahl says:

    Kremlin and Russia’s TASS news agency websites offline following attacks https://www.bitdefender.com/blog/hotforsecurity/kremlin-and-russias-tass-news-agency-websites-offline-following-attacks/
    As widely anticipated, the conflict between Russia and Ukraine has heated up on cyberspace in the days since Vladimir Putin ordered his troops and tanks to invade. This weekend saw the Kremlin’s official website at kremlin.ru brought down, along with other Russian government sites, in what appears to have been a co-ordinated distributed denial-of-service (DDoS) attack.. Myös:
    https://www.is.fi/digitoday/tietoturva/art-2000008648351.html

    Reply
  13. Tomi Engdahl says:

    TrickBot takes down server infrastructure after months of inactivity https://blog.malwarebytes.com/trojans/2022/02/trickbot-takes-down-server-infrastructure-after-months-of-inactivity/
    The king of tricks is dead. Long live the new king. Or will it make a comeback?. While we already assumed TrickBot was dead in the water, the shutdown of the server infrastructure on February 24, 2022, did not go unnoticed. Is this really the end of one of the most active botnets in the last decade?

    Reply
  14. Tomi Engdahl says:

    BrokenPrint: A Netgear stack overflow
    https://research.nccgroup.com/2022/02/28/brokenprint-a-netgear-stack-overflow/
    This blog post describes a stack-based overflow vulnerability found and exploited in September 2021 by Alex Plaskett, Cedric Halbronn and Aaron Adams working at the Exploit Development Group (EDG) of NCC Group. The vulnerability was patched within the firmware update contained within the following Netgear advisory. The vulnerability is in the KC_PRINT service (/usr/bin/KC_PRINT), running by default on the Netgear R6700v3 router. Although it is a default service, the vulnerability is only reachable if the ReadySHARE feature is turned on, which means a printer is physically connected to the Netgear router through an USB port. No configuration is needed to be made, so the default configuration is exploitable as soon as a printer is connected to the router.

    Reply
  15. Tomi Engdahl says:

    Beware of charity scams exploiting war in Ukraine https://www.welivesecurity.com/2022/02/27/beware-charity-scams-exploiting-war-ukraine/
    Times of crisis may bring out the best in you, but they also have a way of bringing out the worst in scammers. They, too, follow the headlines and will go into overdrive in their attempts to part people from their money. Weve seen this time and again during the COVID-19 pandemic, and just a few days into it the war in Ukraine is no different. If the crisis has you worried and youre looking to support humanitarian work on the ground through a donation, make sure your money goes to the right cause.

    Reply
  16. Tomi Engdahl says:

    Updates on Our Security Work in Ukraine
    https://about.fb.com/news/2022/02/security-updates-ukraine/
    In response to Russias invasion of Ukraine, our teams have been on high alert to identify emerging threats and respond as quickly as we can. Here are a few updates on our security work. In the last 48 hours, we uncovered a relatively small network of about 40 accounts, Pages and Groups on Facebook and Instagram. They were operated from Russia and Ukraine and targeted people in Ukraine across multiple social media platforms and through their own websites.

    Reply
  17. Tomi Engdahl says:

    Conti ransomware’s internal chats leaked after siding with Russia https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/
    A Ukrainian security researcher has leaked over 60,000 internal messages belonging to the Conti ransomware operation after the gang sided with Russia over the invasion of Ukraine. BleepingComputer has independently confirmed the validity of these messages from internal conversations previously shared with BleepingComputer regarding Conti’s attack on Shutterfly.. Also:
    https://therecord.media/conti-ransomware-gang-chats-leaked-by-pro-ukraine-member/

    Reply
  18. Tomi Engdahl says:

    Reborn of Emotet: New Features of the Botnet and How to Detect it https://thehackernews.com/2022/02/reborn-of-emotet-new-features-of-botnet.html
    One of the most dangerous and infamous threats is back again. In January 2021, global officials took down the botnet. Law enforcement sent a destructive update to the Emotet’s executables. And it looked like the end of the trojan’s story. But the malware never ceased to surprise. November 2021, it was reported that TrickBot no longer works alone and delivers Emotet. And ANY.RUN with colleagues in the industry were among the first to notice the emergence of Emotet’s malicious documents.

    Reply
  19. Tomi Engdahl says:

    Ukraine says its ‘IT Army’ has taken down key Russian sites https://www.bleepingcomputer.com/news/security/ukraine-says-its-it-army-has-taken-down-key-russian-sites/
    Key Russian websites and state online portals have been taken offline by attacks claimed by the Ukrainian cyber police force, which now openly engages in cyber-warfare

    Reply
  20. Tomi Engdahl says:

    Toyota to Close Japan Plants After Suspected Cyberattack https://threatpost.com/toyota-to-close-japan-plants-after-suspected-cyberattack/178686/
    What was potentially a cyberattack hit one of Toyotas parts suppliers, causing the company to move to shut down about a third of the companys global production tomorrow, the company announced on Monday. Toyota doesnt know how long the 14 plants will be unplugged. The closure will mean that the companys output will shrink by around 13,000 cars.
    Reuters reported that within hours of Japan having joined Western allies in blocking some Russian banks from accessing the SWIFT international payment system and committing to giving Ukraine $100 million in emergency aid, a spokesperson at Toyota supplier Kojima Industries Corp. said that it had apparently been hit by some kind of cyber attack.. Also:
    https://www.bleepingcomputer.com/news/security/toyota-halts-production-after-reported-cyberattack-on-supplier/

    Reply
  21. Tomi Engdahl says:

    Ukraine says its ‘IT Army’ has taken down key Russian sites https://www.bleepingcomputer.com/news/security/ukraine-says-its-it-army-has-taken-down-key-russian-sites/
    Key Russian websites and state online portals have been taken offline by attacks claimed by the Ukrainian cyber police force, which now openly engages in cyber-warfare. As the announcement of the law enforcement agency’s site details, specialists from the force have teamed with volunteers to attack the web resources of Russia and Belarus. The three countries are currently involved in an ongoing and large-scale armed forces conflict that includes a cyber frontline, which manifested even before the invasion.

    Reply
  22. Tomi Engdahl says:

    Elon Musk activates Starlink to help keep Ukraine’s internet up and running https://www.zdnet.com/article/elon-musk-activates-starlink-to-help-keep-ukraines-internet-up/
    With Russia’s invasion of Ukraine, Ukraine’s internet was sent staggering. Georgia Tech’s Internet Outage Detection and Analysis
    (IODA) project, which monitors the internet, reported serious outages in Ukraine starting late on February 23. In response to this and other internet attacks, Ukraine’s Vice Prime Minister and Minister of Digital Transformation Mykhailo Fedorov requested help from SpaceX and Tesla billionaire Elon Musk.

    Reply
  23. Tomi Engdahl says:

    Ukraina sai apua kybersodankäyntiin: Hakkerit häiritsivät Venäjän sotakalustoa
    https://www.kauppalehti.fi/uutiset/ukraina-sai-apua-kybersodankayntiin-hakkerit-hairitsivat-venajan-sotakalustoa/78dfa9f8-03de-4440-8655-3bf0deae92f9
    Kyberpartisaaneiksi itseään kutsuva valkovenäläinen hakkeriryhmä kertoi sunnuntaina tunkeutuneensa tietokoneille, jotka ohjaavat Valko-Venäjän junaliikennettä, uutisoi Bloomberg. Ryhmän mukaan se sai joitain junia pysähtymään Minskiin ja Orshaan sekä Osipovichin kaupungin liepeille. Ryhmä kertoo muuttaneensa järjestelmän reitityksiä sekä salanneensa niissä ollutta dataa.

    Reply
  24. Tomi Engdahl says:

    Viasat says ‘cyber event’ is causing broadband outages across Europe https://www.zdnet.com/article/viasat-confirms-cyberattack-causing-outages-across-europe/
    Satellite communications giant Viasat said a cyberattack was causing network outages impacting internet service for fixed broadband customers in Ukraine and elsewhere on its European KA-SAT network. The California-based company, which provides high-speed satellite broadband services, told ZDNet the outages were caused by a cyberattack. “Our investigation into the outage continues, but so far we believe it was caused by a cyber event. We are investigating and analyzing our European network and systems to identify the root cause and are taking additional network precautions to prevent further impacts while we attempt to recover service to affected customers,”
    said Christina Phillips, vice president of public relations at Viasat.

    Reply
  25. Tomi Engdahl says:

    Englands Hospitals Told To Boost Cybersecurity Amid Russia-Ukraine Conflict https://www.forbes.com/sites/katherinehignett/2022/02/28/englands-hospitals-told-to-boost-cybersecurity-amid-russia-ukraine-conflict/
    Hospitals in England have been asked to shore up their cybersecurity as Russian fighting in Ukraine escalates. Putin sent troops into its neighbor country on Thursday in what a U.S. defense official has called the “largest conventional military attack” since the Second World War. National Health Service chief operating officer Sir David Sloman warned hospital trusts to improve their cyber defenses in an email sent Friday evening, according to specialist outlet HSJ.

    Reply
  26. Tomi Engdahl says:

    A Free-for-All But No Crippling Cyberattacks in Ukraine War
    https://www.securityweek.com/free-all-no-crippling-cyberattacks-ukraine-war

    Russia has some of the best hackers in the world, but in the early days of the war in Ukraine, its ability to create mayhem through malware hasn’t had much of a noticeable impact.

    Instead, it’s Ukraine that’s marshalled sympathetic volunteer hackers in an unprecedented collective global effort to make the Kremlin pay for making war on its neighbor. It’s a kind of cyber free-for-all that experts say risks escalating a moment already fraught with extraordinary danger after Russian President Vladimir Putin put his nuclear forces on alert.

    So far, Ukraine’s internet mostly works, its president still able to rally global support via a smartphone, and its power plants and other critical infrastructure still able to function. The kind of devastating cyberattacks thought likely to accompany a large-scale Russian military invasion haven’t happened.

    “It has not played as large a component as some people thought it might and it definitely has not been seen outside of Ukraine to the extent that people feared,” said Michael Daniel, a former White House cybersecurity coordinator. “Of course, that could still change.”

    It’s not clear why Russia hasn’t landed a more powerful cyber punch. Russia might have determined that the impact wouldn’t be serious enough — Ukraine’s industrial base is far less digitized than in Western nations, for one. Or Russia might have determined that it couldn’t do serious harm to Ukraine without risking collateral impact outside its borders.

    Many cybersecurity experts believe the Kremlin, at least for now, prefers to keep Ukraine’s communications open for the intelligence value.

    Reply
  27. Tomi Engdahl says:

    Microsoft: Cyberattacks in Ukraine Hitting Civilian Digital Targets
    https://www.securityweek.com/microsoft-cyberattacks-ukraine-hitting-civilian-digital-targets

    Microsoft is calling attention to a surge in cyberattacks on Ukrainian civilian digital targets, warning that the new “digital war” includes destructive malware attacks on emergency response services and humanitarian aid efforts.

    The Redmond, Wash. software giant said the attacks on civilian targets raise serious concerns under the Geneva Convention.

    “We remain especially concerned about recent cyberattacks on Ukrainian civilian digital targets, including the financial sector, agriculture sector, emergency response services, humanitarian aid efforts, and energy sector organizations and enterprises,” said Microsoft president Brad Smith.

    “These attacks on civilian targets raise serious concerns under the Geneva Convention, and we have shared information with the Ukrainian government about each of them,” Smith said in a statement published Monday.

    Digital technology and the war in Ukraine
    https://blogs.microsoft.com/on-the-issues/2022/02/28/ukraine-russia-digital-war-cyberattacks/

    All of us who work at Microsoft are following closely the tragic, unlawful and unjustified invasion of Ukraine. This has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyberattacks on computer networks and internet-based disinformation campaigns. We are fielding a growing number of inquiries about these aspects and our work, and therefore we are putting in one place a short summary about them in this blog. This includes four areas: protecting Ukraine from cyberattacks; protection from state-sponsored disinformation campaigns; support for humanitarian assistance; and the protection of our employees.

    At the outset, it’s important to note that we are a company and not a government or a country. In times like this, it’s especially important for us to work in consultation with those in government and, in this instance, our efforts have involved constant and close coordination with the Ukrainian government, as well as with the European Union, European nations, the U.S. government, NATO and the United Nations.

    Reply
  28. Tomi Engdahl says:

    CISA, FBI Issue Warnings on WhisperGate, HermeticWiper Attacks
    https://www.securityweek.com/cisa-fbi-issue-warnings-whispergate-hermeticwiper-attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released indicators of compromise to help threat hunters look for signs of WhisperGate and HermeticWiper, two destructive malware files seen in recent attacks against organizations in Ukraine.

    Both malware families are destructive in nature: they were designed to wipe the Master Boot Record (MBR) of the victim system to render it inoperable.

    The malware attacks were publicly disclosed in the weeks prior to the Russian invasion of Ukraine, but it appears that they had been prepared well in advance. In both cases, the attackers had access to the compromised organizations months before the wipers were deployed.

    Microsoft detailed the WhisperGate attacks on January 15, but there’s evidence the attackers had access to some of the compromised environments since October 2021.

    Reply
  29. Tomi Engdahl says:

    Twitter to Label Tweets Linking to Russian State Media
    https://www.securityweek.com/twitter-label-tweets-linking-russian-state-media

    Twitter will put warnings on tweets sharing links to Russian state-affiliated media, the platform said Monday, as Kremlin-tied outlets are accused of spreading misinformation on Moscow’s invasion of Ukraine.

    Pressure is on social media giants to squelch misleading or false information about the attack, which has drawn fierce international condemnation.

    Kremlin-run media outlets RT and Sputnik have both faced accusations of using false narratives in an effort to argue in favor of war.

    Reply
  30. Tomi Engdahl says:

    Anonymous: Russian media channels broadcast Ukrainian songs after hacker group declare cyber war
    A number of Russian state websites, including the official website of the Kremlin, were affected by the outage on Saturday
    https://inews.co.uk/news/world/anonymous-hacker-group-russia-tv-channels-broadcast-ukrainian-songs-1486735

    Pro-Ukraine hackers have launched a wave of cyberattacks against Russia, with Russian TV channels hacked to play Ukrainian songs, and Kremlin government networks disabled in what the hackers describe as a cyber war against Vladmir Putin.

    As the war in Ukraine escalates, the official Kremlin website, kremlin.ru, was affected by the outage on Saturday along with another six Russian state websites. It came as Ukraine’s vice prime minister said it had launched an ‘IT army’ to combat Russia in cyberspace.

    The Kyiv Independent also revealed that hackers played Ukrainian songs on Russian TV channels and disabled government websites including that of the Ministry of Defence and Duma.

    Reply
  31. Tomi Engdahl says:

    Ukraine war: What part is hackers’ collective Anonymous playing in the war effort against Russia?
    https://www.euronews.com/next/2022/02/28/ukraine-war-what-part-is-hackers-collective-anonymous-playing-in-the-war-effort-against-ru

    They’re mysterious, they’re disruptive, and they’ve picked their side in the war pitting Russia against Ukraine.

    The hacker collective Anonymous has claimed credit for several cyberattacks that took down Russian government websites and state-backed news outlets in recent days.

    On Monday, several prominent Russian media services appeared to have been hit simultaneously, including the state-run news agencies TASS and RIA Novosti and the newspaper Kommersant.

    Their homepages temporarily displayed a message opposing Russia’s invasion of Ukraine, news agency AFP reported.

    Reply
  32. Tomi Engdahl says:

    Ukraine takes the resistance to cyberspace, assembling an ‘IT army’ to hack sites from Russia and its allies, calls on tech leaders to get involved
    https://techcrunch.com/2022/02/27/ukraine-takes-the-resistance-to-cyberspace-assembling-an-it-army-to-hack-sites-from-russia-and-its-allies-calls-on-tech-leaders-to-get-involved/

    Reply
  33. Tomi Engdahl says:

    Hakkeriryhmä: Venäjän hallinnon sivuja kaadettu – tv-kanava hakkeroitiin näyttämään todenmukaista tietoa
    Kansainvälinen hakkeriryhmä väittää tehneensä laajan kyberiskun Venäjän hallinnon verkkosivuilla ja väitetysti myös valtion tv-kanavalle.
    https://www.iltalehti.fi/ulkomaat/a/0eec3d84-867d-4993-bed1-10e75f31a698

    Reply
  34. Tomi Engdahl says:

    Sky News employees caught in cyber breach
    https://www.smh.com.au/business/companies/sky-news-employees-caught-in-cyber-breach-20220225-p59zqs.html

    Foxtel’s cable news channel Sky News Australia has become the latest media company to suffer a cybersecurity incident, with personal identification details of staff stolen following a major hack of a third-party provider.

    Staff at the Rupert Murdoch-owned news channel were told that their personal information may have been caught in the cybersecurity breach at payroll provider Frontier Software late last year.

    Reply
  35. Tomi Engdahl says:

    Hero hackers claim to have breached Belarusian weapons firm
    https://cybernews.com/news/hero-hackers-claim-to-have-breached-belarusian-weapons-firm/

    The international hacker collective Anonymous appears to have made good on its declaration of cyberwar against Russia and its allies, apparently exposing 200GB of emails from Belarusian weapons manufacturer Tetraedr.

    Reply
  36. Tomi Engdahl says:

    World’s cartoonists on this week’s events
    Drawing the top stories around the globe.
    https://www.politico.eu/article/worlds-cartoonists-on-this-weeks-events-41/

    Reply
  37. Tomi Engdahl says:

    OPINION
    Putin’s Hitler-like tricks and tactics in Ukraine
    The glorification of violence and the disregard for law is central to the history of fascism. Taking law seriously and preventing senseless war was supposed to be the lesson learned from World War II.
    https://www.bostonglobe.com/2022/02/24/opinion/putins-hitler-like-tricks-tactics-ukraine/#aoh=16459824299131&referrer=https%3A%2F%2Fwww.google.com&amp_tf=Julkaisija%3A%20%251%24s&ampshare=https%3A%2F%2Fwww.bostonglobe.com%2F2022%2F02%2F24%2Fopinion%2Fputins-hitler-like-tricks-tactics-ukraine%2F

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*