Guerrero-Saade, who is at the forefront of AcidRain’s research, says that while the previous malicious software used by the Russians was narrowly targeted, AcidRaid was more of a universal weapon.

“What is extremely worrying about AcidRaid is that they have removed all safety checks,” he said. “Under the previous cleaners, the Russians were careful to perform only on certain devices. Now these security checks are gone and they are rude. They have an ability that they can reuse. The question is what supply chain attack will we see next?

The attack turned out to be typical of the “hybrid” war strategy used by Moscow, experts say. He was released along with the invasion of the earth. This exact type of coordination between Russian cyber operations and the military has been observed at least six times, according to a Microsoft study that highlights the emerging role of cyberspace in modern warfare.

“Russia’s coordinated and destructive cyberattack before the Ukrainian invasion shows that cyberattacks are being used actively and strategically in modern warfare, even if the threat and consequences of a cyberattack are not always visible to the public,” said Danish Defense Minister Morten Bodskov. . “The cyber threat is constant and evolving. Cyberattacks can do great damage to our critical infrastructure with fatal consequences. “

In this case, the damage was transferred from Ukraine and affected thousands of Internet and Internet-connected wind farms in Central Europe. And the consequences are even greater: Viasat is working with the US military and its partners around the world.

“Obviously the Russians confused him,” Guerrero-Saade said. “I do not think they intended to do so much damage by spraying and involve the European Union. They called on the EU to respond, affecting 5,800 German wind turbines and others around the EU.

Just hours before AcidRain began its destructive work against Viasat, Russian hackers used another wiper, called HermeticWiper, against Ukrainian government computers. The handbook was ominously similar, except that instead of satellite communications, the targets were Windows machines on networks that would be important to the Kyiv government in the early hours of the invasion to provide effective resistance.

Previous articleCoinDCX launches CoinDCX venture, engages in Web3.0 ecosystem growth in India
Next articleCOSEL Announces 6W High Insulation DC / DC Converters for Medical, Industrial and ICT Applications –