Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Ukrainian government and banks affected by cyberattacks

By Maria Henriquez
ukraine-freepik1170x658.jpg
February 24, 2022

The websites of Ukraine’s government, foreign ministry and state security service were brought down again by a distributed denial of service attack (DDoS). 


“At about 4 pm, another mass DDoS attack on our state began. We have relevant data from a number of banks,” said Mykhailo Fedorov, Minister of Digital Transformation, adding that the parliament website was also hit. Earlier this week, Ukrainian authorities noted they had seen signs that hackers were preparing to launch major attacks on government agencies, banks and the defense sector.


While the parliament and defense ministry websites were quickly restored, those of the Ministry of Internal Affairs and the security service had not returned online by Wednesday evening in Kyiv.


According to Ukraine’s Centre for Strategic Communications, administrators tried to limit the damage by changing providers, but even if sites were restored, users could experience delays. 


A nonprofit that tracks network disruptions, NetBlocks said that the websites of PrivatBank, a large commercial bank in Ukraine, and Oschadbank, the State Savings Bank of Ukraine, had also been rendered unavailable.


Last week, a similar attack took down a number of sites in the country. The White House National Security Council recently said that the GRU, Russia’s military agency, was linked to those cyberattacks. “Known GRU infrastructure has been noted transmitting high volumes of communications to Ukraine-based IP addresses and associated banking-related domains,” the National Security Council said.


In January, Ukraine said Russia was behind another DDoS attack that impacted 70 government sites that contained a warning to Ukrainians to “prepare for the worst.” 


David Jemmett, CEO of Cerberus Sentinel, says, “Today’s attack on Ukraine’s government, foreign ministry and state security service is the latest salvo in yet another digital nation-state assault. It is further proof that all organizations and the world’s citizens need measures to protect their most critical assets: infrastructure, sensitive information, intellectual property, identity and privacy.” Jemmett suggests that security leaders need to work together to establish true security cultures in public and private organizations to stop threats and ensure resiliency.


Update 2/24/2022: It is clear now that the wave of DDoS attacks, as well as a new form of wiper malware installed on hundreds of systems in Ukraine, were a sign that a Russian invasion was imminent. 

The attacks were seen hitting Ukraine in the hours leading up to the Russian invasion. As the United Nations Security Council held an emergency session late Wednesday in hopes of preventing the invasion, military strikes began across Ukraine. Reporters heard explosions in the capital Kyiv, in the eastern city of Kharkiv, and in the port city of Odessa. Explosions were reported outside of Kramatorsk, a town in the Donbas region controlled by Ukraine. Explosions were also reported near Kyiv's main airport, as well as around other cities in Ukraine. 

After weeks of denying Russia's plans to invade Ukraine, President of Russia Vladimir Putin announced a "special military operation" to protect civilians in eastern Ukraine — a claim the U.S. predicted Putin would make as a pretext to invade Ukraine. 

Security magazine is actively covering the ongoing Russia-Ukraine crisis. For more information on the conflict, please visit www.securitymagazine.com.

KEYWORDS: cyber security cyber warfare DDoS information security public safety risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • airport-freepik1170x658v6.jpg

    Russia's air transport agency affected by cyberattacks

    See More
  • kiev-freepik1170x658.jpg

    Ukrainian Defense Ministry and banks hacked

    See More
  • warning-freepik1170x658x4.jpg

    Massive cyberattack hits Ukrainian government

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing