Representatives of Ukrposhta ,Ukraine’s national postal service report detecting a cyberattack after a postage stamp showing a Ukrainian soldier making a rude gesture to a Russian warship was put up for sale. Since its launch, queues formed to buy the stamp at the Kiev post office, which represents one of the hotspots during the Russian invasion of Ukraine.
Ihor Smilianskyi, director general of the Ukrainian postal service, apologized to customers for the inconvenience caused by what he described as a denial of service (DoS) attack, without attributing responsibility for the incident to a specific threat actor.
Through a message posted on a verified Facebook profile, Smilianskyi notes: “We are really doing everything we can, together with internet providers, to restore both the online store and other postal service systems that were also temporarily disrupted due to a DoS attack.”
Ukrainian officials warned of the danger of cyberattacks by Russian government-sponsored hackers, which have increased since the start of the military invasion. While the Kremlin has denied these allegations, the attacks have only increased; A few weeks ago, Ukraine claimed to have thwarted an attempt by Russian hackers to try to damage its electrical infrastructure, as happened in 2015.
Cyberattacks have been an important part of the conflict since its inception. Shortly after Russia ordered its troops to enter Ukrainian territory, the hacktivist group Anonymous began deploying various cyberattacks against online infrastructure controlled by public and private organizations in Russia, as an act of condemnation of the decision to invade the neighboring country. Other entities such as Distributed Denial of Secrets (DDoSecrets) have focused on leaking confidential information from the Russian government to try to limit the scope of their military operations.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.