Start your day with intelligence. Get The OODA Daily Pulse.
More than any of the mixed signals of the high-level meetings between the U.S. and Russia, two cyberwar developments today are far more clear indicators of the direction of the Ukrainian conflict playing out between NATO, Putin, and the U.S.
One event – a major cyberattack on Ukrainian government websites – does not, as of yet, have direct nation-state attribution to Russia (which is possibly how they want the attack to “play’ in the media. Cyberattack as misinformation). The other – the Russian Federal Security Service (FSB) takedown of the REvil Ransomware Gang – is very specific, positive signaling from the Kremlin to the White House that they understand the seriousness with which the U.S. military and intelligence apparatus are taking the strategic cyber threats posed by Russia to the U.S. political and economic systems and the U.S. homeland.
The concurrent elements of appeasement and aggression are troubling. Both events have false flag elements relative to the other, which makes for both a tactical and strategic quandary for the U.S. and Ukraine (as the governments and military sort out the true impact and implications of these cyber maneuvers by Russian state and non-state actors). Are both incidents integrated active measures and only part of a larger geopolitical operation by the Russians?
Moments ago (and just days after talks on Ukraine, where the U.S. and Russia Deadlocked Over NATO Expansion), The Record just reported that “The Russian Federal Security Service (FSB) said today that it has raided and shut down the operations of the REvil ransomware gang.” (1)
Below, we include the full text of the press release sent out by the FSB today to highlight the specificity of the language about cooperation with U.S. law enforcement, consistent with a direct request by the U.S. in July that Russia must crack down on cybercriminals.
This raid signals cooperation with the U.S. requests made by phone directly by President Biden to President Putin and reinforced during negotiations a few days ago. What is unclear is, while this raid is a positive development in U.S/Russia relations, how does the raid impact the conditions on the ground in Ukraine? The raid appeases the U.S. but does not directly address Ukraine’s interests and the military threat posed by Russia to the region.
The full text of the FSB Press Release [CAPS theirs]:
The Federal Security Service of the Russian Federation, in cooperation with the Investigation Department of the Ministry of Internal Affairs of the Russian Federation, has suppressed the illegal activities of members of an organized criminal community in the cities of Moscow, St. Petersburg, Moscow, Leningrad and Lipetsk regions.
The basis for the search was the appeal of the competent US authorities, who reported on the leader of the criminal community and his involvement in encroachments on the information resources of foreign high-tech companies through the introduction of malicious software, encryption of information and extortion of funds for its decryption.
The FSB of Russia established the full composition of the criminal community “REvil” and the involvement of its members in the illegal circulation of means of payment, documentation of illegal activities was carried out.
In order to implement the criminal plan, these persons developed malicious software, organized the theft of funds from the bank accounts of foreign citizens and their cashing, including through the purchase of expensive goods on the Internet.
As a result of a complex of coordinated investigative and operational-search measures in 25 addresses at the places of stay of 14 members of the organized criminal community, funds were seized: over 426 million rubles, including in cryptocurrency, 600 thousand US dollars, 500 thousand euros, as well as computer equipment, crypto wallets used to commit crimes, 20 premium cars purchased with money obtained by criminal means.
The detained members of the OPS were charged with committing crimes under Part 2 of Article 187 “Illegal circulation of means of payment” of the Criminal Code of Russia.
As a result of the joint actions of the FSB and the Ministry of Internal Affairs of Russia, the organized criminal community ceased to exist, the information infrastructure used for criminal purposes was neutralized.
Representatives of the competent US authorities have been informed of the results of the operation.
According to CNN: “A threatening message of “be afraid and wait for the worst” was shone on a number of Ukrainian government websites after they were targeted in a cyberattack.” Source: CNN.com
Source: https://archive.fo/VIDeS/image
Today’s OODA Loop Daily Pulse included the following report: Cyberattack hits Ukraine government websites: Here is what you should do. Please take a look for OODA-informed next steps if your organization is a possible target for Russian state and non-state actors in this current climate.
Sources tell me ~15 sites in Ukraine – all using October content management system – have been defaced, incl Min of Foreign Affairs, Cabinet of Ministers, Min of Ed, Emergency Services, Treasury, Environmental Protection. Attackers apparently used this: https://t.co/7ojWbjZWDd pic.twitter.com/FaepCsRO5E
— Kim Zetter (@KimZetter) January 14, 2022
What we Know (from CNN and The Record):
As a result of a massive cyber attack, the websites of the Ministry of Foreign Affairs and a number of other government agencies are temporarily down. Our specialists have already started restoring the work of IT systems, and the cyberpolice has opened an investigation.
— Oleh Nikolenko 🇺🇦🇨🇦 (@OlehNikolenko_) January 14, 2022
What’s Next: Expect more attacks like this, not just on Ukraine, but on NATO governments and on commercial entities. Some malicious code can escape like in the June 2017 NotPetya attacks.
Your Action: Read the latest on the cyber threat and defensive strategies on the OODA Cyber Sensemaking page. Become an OODA Network member to discuss this topic with peers. For tips on establishing a more detailed action plan see: The OODA C-Suite Guide To Improving Your Cybersecurity Posture Before Russia Invades Ukraine
https://oodaloop.com/archive/2021/12/22/c-suite-guide-to-improving-your-cybersecurity-posture-before-russia-invades-ukraine/
Further Resources
Security Researcher Gary Warner turned around this quick, prescient analysis earlier this AM. Find it here.
A related story in the last few days on the ground in Ukraine: Ransomware gang behind attacks on 50 companies arrested in Ukraine
Previous OODA Loop coverage of REvil
Kaseya Obtains Universal Decryptor for REvil Ransomware
Kaseya Patches Zero-Days Used in REvil Attacks
REvil Group Demands $70 Million for ‘Universal Decryptor’
REvil Claims Responsibility for Invenergy Hack
REvil Hits US Nuclear Weapons Contractor
JBS Paid $11M to REvil Gang Even After Restoring Operations
Cyberwar and Cybercrime Analyses:
Will Cyber Breaches Start a Shooting War?
The Next Evolution of Ransomware Gangs: Collaboration
Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. See: Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis
The OODA leadership and analysts have decades of experience in understanding and mitigating cybersecurity threats and apply this real world practitioner knowledge in our research and reporting. This page on the site is a repository of the best of our actionable research as well as a news stream of our daily reporting on cybersecurity threats and mitigation measures. See: Cybersecurity Sensemaking
OODA’s leadership and analysts have decades of direct experience helping organizations improve their ability to make sense of their current environment and assess the best courses of action for success going forward. This includes helping establish competitive intelligence and corporate intelligence capabilities. Our special series on the Intelligent Enterprise highlights research and reports that can accelerate any organization along their journey to optimized intelligence. See: Corporate Sensemaking
This page serves as a dynamic resource for OODA Network members looking for Artificial Intelligence information to drive their decision-making process. This includes a special guide for executives seeking to make the most of AI in their enterprise. See: Artificial Intelligence Sensemaking
From the very beginning of the pandemic we have focused on research on what may come next and what to do about it today. This section of the site captures the best of our reporting plus daily daily intelligence as well as pointers to reputable information from other sites. See: OODA COVID-19 Sensemaking Page.
A dynamic resource for OODA Network members looking for insights into the current and future developments in Space, including a special executive’s guide to space. See: Space Sensemaking
OODA is one of the few independent research sources with experience in due diligence on quantum computing and quantum security companies and capabilities. Our practitioner’s lens on insights ensures our research is grounded in reality. See: Quantum Computing Sensemaking.
In 2020, we launched the OODAcast video and podcast series designed to provide you with insightful analysis and intelligence to inform your decision making process. We do this through a series of expert interviews and topical videos highlighting global technologies such as cybersecurity, AI, quantum computing along with discussions on global risk and opportunity issues. See: The OODAcast