• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Looming cyber threats from the Russia-Ukraine war

Paul Calatayud by Paul Calatayud
March 30, 2022
Photo by Kris Møklebust from Pexels: https://www.pexels.com/photo/policeman-walking-near-tanks-5764701/

Photo by Kris Møklebust from Pexels: https://www.pexels.com/photo/policeman-walking-near-tanks-5764701/

The ongoing conflict in Ukraine has posed a grave danger to lives and businesses and will have profound consequences extending far beyond the region. CISOs and CIOs across organisations globally and in Asia face the growing spectre of aggressive Russian cyberattacks and need to ramp up their cybersecurity strategies and defences to prepare for whatever may come next.

Why Asia is at risk

In recent years Russia has launched cyber attacks against Georgia and in 2015 brought down Ukraine’s power grids to disrupt the government and businesses.

Russia is claimed to be behind the NotPetya malware attack in 2017, first designed to target the Ukrainian financial, energy and government sector and the self-replicating virus spread rapidly to organisations globally. NotPetya wiped networks and caused billions of dollars in damages as users across Asia, Europe and America were hit by a cyberattack that spread beyond its intended targets.

Why should Asia-Pacific be on high alert? The region is home to four of the five most populous nations in the world and many countries represent high-value targets in a low-security environment. Companies in the Asia Pacific region are particularly vulnerable as digital progress has been uneven and many countries are still grappling with the COVID-19 pandemic.

Across many Asia-Pacific countries, there remains a disproportionately low level of investment in cybersecurity and risk management. The speed of digital transformation has also left many governments playing catch up.

Cyber security firm Mandiant believes advanced persistent threat (APT) groups linked to Russia and its allies will conduct further cyber intrusions, as the stand-off with Ukraine continues

The Russian government’s invasion of Ukraine has since spurred a massive surge in distributed-denial-of-service (DDoS) attacks targeting the Ukrainian government and critical infrastructure. In the weeks ahead, the danger to APAC countries is that Russia might carry out retaliatory cyberattacks on organisations outside Ukraine in retaliation of sanctions being imposed.

Potential threats could range from widely used DDOS ransomware, and phishing attacks to hacktivist campaigns and the spread of sophisticated, destructive malware as part of the state-sponsored cyber activity. It’s impossible to predict how much disruption, including damage to critical infrastructure, these attacks might cause.

Apart from the risks of being a direct target of Russia, organisations must be prepared for increased levels of cybercrime in general. Adversaries are always taking advantage of current news events to adjust their tactics. A major geopolitical conflict provides a perfect opportunity to capitalize on people’s fears, concerns, and general uncertainty.

In light of the escalating Russia-Ukraine conflict, a strong cybersecurity defence has become more critical than ever. CISOs and CIOs in the region’s financial institutions, critical industries, government organisations, and businesses must evaluate their security posture to make sure they’re prepared to defend against potential cyberattacks.

What actions you should take

The first step is to understand if your organisation is prepared. Although the Russia-Ukraine conflict is an extraordinary event, it only highlights the daily cyber activities that are occurring in modern cloud environments. Any robust enterprise security strategy, by default, needs to include plans and mitigation steps for withstanding these levels of cyber threats.

However, there are proactive measures that an organisation can take to strengthen its security capabilities and reduce the chances of being compromised.

General best practices & advice

  • Ensure proper business continuity and disaster recovery plans are set. This includes a well-tested incident response process to respond quickly and effectively to any cyber incidents. DDoS attacks are already happening and will increase moving forward, so organisations must be ready to invoke those plans at any moment.
  • Back up critical business systems regularly and consistently to avoid data loss.
  • Apply the least-privilege access principle throughout your environment.
  • Implement basic cybersecurity hygiene. This is fundamental to avoid security gaps (e.g., missing patches and default passwords).
  • Ensure IT and security staff are vigilant and prepared to work diligently to protect customers, processes and systems.

Cloud-native security recommendations

  • Identify exposures, vulnerabilities, and misconfigurations that can provide entry points for attackers to gain access.
  • Scan all running workloads for critical vulnerabilities with known exploits to conduct focused patching and mitigation and use trusted open-source scanners (e.g., Trivy).
  • Scan for vulnerabilities in CI/CD pipelines to ensure no new vulnerabilities can be introduced.
  • Scan for misconfigurations in cloud resources and infrastructure-as-code (IaC) templates. The cloud is the target and must be considered as part of the broader defence strategy, in which visibility and protection are key.
  • Minimise the attack surface and harden cloud and Kubernetes infrastructure.

Conclusion

The ongoing situation in Ukraine means organisations in APAC should be prepared to defend their networks against cyberattacks originating from Russia

As the conflict escalates on both the battlefield and in cyberspace, companies need to stay ahead of potential cyberattacks. By ensuring that networks are as well-defended against attacks as possible, the damage done by attacks can be minimised.

It is important to make sure you have effective security defences is important at any time, but even more so in times of uncertainty and global crises.

As we continue to closely follow the events in Ukraine, we’re committed to providing strong security capabilities that can help our customers protect their most critical assets and business processes.

Related:  Threat actors partnering to increase chances of success
Tags: advanced persistent threatAqua SecurityCISODDoSdistributed denial-of-serviceInfrastructure-as-codeNotPetyaransomwareRussia-Ukraine WarTrivy
Paul Calatayud

Paul Calatayud

Paul Calatayud is the chief information security officer (CISO) at Aqua Security. He also serves as the Chief Privacy Officer, external CISO advisory and industry thought leadership and leads the internal Aqua Security program. Calatayud has spent more than two decades leading product and security teams for companies across industries ranging from Fortune 500 companies to startups. Most recently, Calatayud served for over four years as Chief Security Officer at Palo Alto Networks and previously held various security, privacy and risk roles at SANS, FireMon and Code 42 among others.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe