Centralizing data in Kyiv robbed Russia of easy access to files and services previously accessible from now-occupied computers in Crimea, Luhansk, and Donetsk. It also prevented those now-untrustworthy computers from becoming backdoors into Ukrainian networks.
Ukraine's locally distributed computer system was the product of historically slow internet speeds that prevented large, frequent data transfers. But the country's modernization meant it could move everything to web platforms based in Kyiv (with multiple backup sites).
Ukraine's now-centralized repository of government data is a high-profile target for Russia. These databases don't just store sensitive military and intelligence files. They also hold information about tens of millions of citizens, from passports to pension records.
Russia has reportedly prepared a "kill list" of Ukrainians nytimes.com/2022/02/20/wor… and captured govt databases could help them implement it.
Seizing seemingly innocuous Ukrainian government databases would help Russia "do contact tracing, figure out who [people are] close to, and use that to build out their network and dial in on the targets that they're looking for," @Adam_Cyber told me.
It should be noted that Russia doesn't need physical access to Ukraine's servers to steal their data. Moscow has sophisticated intelligence services that have been stealing it for years. But seizing Kyiv and the hard drives would be an intel coup unprecedented in modern warfare.
When Afghanistan fell to the Taliban, militants seized data belonging to the defeated pro-American government. politico.com/news/2021/08/2…
That was a major blow.
But the Taliban's ability to exploit that data is nothing compared to Russia's.
This would be a next-level disaster.
Zhora says Ukraine's cyber defenders are ready to wipe servers and transfer data out of Kyiv if necessary.
“We have plans and we have scenarios,” he told me. "We can move to new locations, we can save data, and we can delete data and prevent capturing all this data."
If advancing Russian troops find Ukrainian govt passwords as they seize city offices, Ukrainian agencies are prepared to "quickly cut off access to these compromised accounts," Zhora said.
He contended that Russia will find “no sensitive data” on government workers’ computers.
“I don't want to consider this absolutely terrible scenario of attacking Kyiv," Zhora said. "Hopefully this will not happen."
But he's confident that the government will "implement prepared scenarios" and do what's necessary to move sensitive data out of harm's way.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Symantec's Eric Chien tells me: "We are seeing the wiper across multiple organizations in different sectors in the Ukraine including finance and government organizations. The wiper uses a legitimate driver to gain low level hard disk access to wipe data."
White House briefing starting now. Anne Neuberger, deputy national security adviser for cyber, is one of the speakers.
Neuberger: “While there are currently no specific or credible cyber threats to the homeland, the U.S. government has been preparing for potential geopolitical contingencies since before Thanksgiving.”
Essentially confirming recent WaPo story, Neuberger says USG "believes that Russian cyber actors likely have targeted the Ukrainian government, including military and critical infrastructure networks, to collect intelligence & preposition to conduct disruptive cyber activities."
During panel at Munich Cybersecurity Conference, FBI Cyber Division's Tonya Ugoretz says "international standardization" of AML rules for cryptocurrency "would greatly help" stop ransomware. Many countries don't have consistent rules, so even well-meaning exchanges can't help.
Ugoretz: "Sometimes foreign exchanges want to be cooperative...but because they don't have that existing framework that provides consistency in the types of information that they're collecting about their customers, they may not even have the information on hand to provide..."
On ransomware, DHS Under Secretary for Policy Rob Silvers says “we are taking this problem on from all angles, and it's among our very highest cybersecurity priorities.” He notes stopransomware.gov, various alerts and guidance docs, and partnerships with other agencies.
Deputy AG Lisa Monaco is speaking now at the Munich Cybersecurity Conference.
“We're adapting old tools to use in new ways," she says, "while also designing novel techniques to use in our major cyber investigations.”
Monaco: “The FBI is forming a specialized team dedicated to cryptocurrency, the Virtual Asset Exploitation Unit."
The team brings together cryptocurrency experts to "provide equipment, blockchain analysis, virtual asset seizure, and training to the rest of the FBI."
DOJ's National Cryptocurrency Enforcement Team now has a dozen prosecutors, Monaco says. And former AUSA Eun Young Choi, a senior counsel to Monaco, will be the team's first director. Choi oversaw the JPMorgan hack case.
Deputy National Security Adviser for Cyber Anne Neuberger is traveling to Europe today for a week of meetings with U.S. partners on cyber issues, including the defense of Ukraine, senior administration officials told reporters.
Neuberger will start in Brussels w/ meetings w/ EU counterparts & NATO officials on cyber resilience, a sr admin official said, "including deterring, disrupting, and responding to further Russian aggression against Ukraine, neighboring states, and in our respective countries."
After Brussels, Neuberger will travel to Warsaw for meetings with Polish officials and reps from Baltic govts.
She'll also meet with reps from the "Bucharest Nine" group of eastern NATO allies, and she'll meet virtually with French and German officials.