Kids Teepee – The Gift You Have Been Looking For!

Do you have a little one who loves to play pretend? Or are you looking for the perfect gift for a unique child in your life? If so, then kids teepee is an excellent choice!

Kids teepees have gained popularity in recent years as a fun and unique way for kids to play. On top of being a blast to play in, the teepee can be a stylish addition to any child’s bedroom or playroom. Boho chic or rustic country, your child can have the decor to match their style.

We have searched high and low to bring you the best selection of kids’ teepees on the market. We have something for every taste and budget. Whether you are looking for a traditional white teepee or something more colorful, we have the perfect option for you!

Take a look at our top picks and find the perfect kids teepee for your little one today!

Best Kids Teepee – Our Top Picks

Kids Teepees make the perfect gift for any occasion. They are fun, unique, and sure to please any child. Order yours today and see the joy it brings!

Razee Teepee for Kids and Adults

The Razee Teepee is the perfect option for both kids and adults. It is big enough to accommodate up to 3 children or an adult. Measurements: 60” x 50” x 85”

It is made of sturdy cotton canvas – 100% natural and unpainted. The poles are made of natural pine wood and are also unpainted. The materials used to make this kids’ teepee are durable, comfortable, and free of chemical odors and harmful substances.

This teepee can be used both indoors and outdoors. It is easy to set up and take down, making it perfect for use at home or on the go. The Razee Teepee comes with a carrying case for easy transport.

LGMOONYE Foldable Teepee Tent for Kids Lace and Pompom Ball Design

This kid’s teepee melted our hearts! The lace and pompom ball design is so pretty and cute. The teepee is made of 100% cotton canvas with a wooden frame.

This children’s tent is made of 100% natural cotton canvas and sturdy pine wood. This Kids Teepee Tent is environmentally friendly, safe, and harmless to the human body, making it ideal for kids.

The teepee comes with a set of accessories that will surely help you make it cozier: floor mat and colored flag. A carry bag goes along with the teepee so that it can be easily transported. However, due to the adorable design and light color of the fabric, we recommend using this kids teepee only inside.

Measurements: 67.8″ x 47.3″ x 61″

Tiny Land Kids Teepee Tent

The Tiny Land Kids Teepee Tent is the perfect choice for any child. It can be used indoors and outdoors, and you can be sure that it will withstand the test of time.

The canvas of this kids teepee is heavier-duty, making it resistant to fading and tearing. The poles are made of natural pine wood. The look follows the high-quality: the gray stripes on the white teepee look great and make it easy to match any room decor.

Tiny Land Kids Teepee Tent comes with accessories: star string lights and a soft mat. That makes it more comfortable for kids and a very good deal.

Dimensions: 47″ x 47″x 63″

FURNIFE Kids Teepee Tent for Kids

FURNIFE Kids Teepee Tent is one of the best-rated kids teepees on Amazon. This teepee is made with top-quality and non-toxic polyester fabric (effortless to clean!) and safe wooden poles.

The teepee is lightweight and easy to assemble, yet very sturdy. The bright colors and fun designs will keep your child entertained for hours on end.

Razee Teepee Tent for Kids with Artificial Vines

This Razee Teepee Tent for Kids is a great choice for those looking for something special. The artificial vines make it look like a real teepee in the wilderness.

The materials used are the same as the previous model from the same brand: 100% natural and unpainted cotton canvas and pinewood poles. This one, however, is smaller in size: 70.9″ x 47.2″ x 47.2″.

This teepee can be used both indoors and outdoors. It comes with a carrying case for easy transport.

JoyNote Teepee Tent for Kids

JoyNote Kids Teepee is made of 100% pure natural breathable cotton canvas. The wood poles are pine and have been sanded to a smooth finish, making them safe for your child.

There are many lovely and one-of-a-kind accessories in this teepee:

  • Silicone sleeves on the bottom of the wood protect the floor and improve stability.
  • Cute pompom ball design.
  • The window parents can use to peep in on their kiddos.
  • The inner pocket to store small toys.

This teepee is easy to set up and take down, and it comes with a carrying case for easy transport.

Dimensions: 48.03″ x 48.03″ x 60″

RONG FA Teepee Tent for Children

This RONG FA Teepee Tent is made of high-quality and safe materials. The poles are made of natural pine wood, and the fabric is 100% cotton canvas.

Setting up and taking down this teepee is a breeze. It comes with a carrying case for easy transport. The RONG FA Teepee Tent is available in two colors: white and blue.

Dimensions: 47″ x 47″ x 60″

PLAYVIBE Kids Teepee Tent for Kids

The PLAYVIBE Kids Teepee Tent is perfect for kids who love to play pretend. It is made of high-quality materials and is safe for kids.

This teepee can be used indoors or outdoors. It is easy to set up and take down: all you need to do is attach canvas to the poles. This teepee comes with its carrying bag, making it easy to transport. Since the poles are made of plastic, the teepee is lightweight.

Dimensions: 48” x 48” x 71”

MountRhino Teepee Tent for Kids

Time for a color explosion! The MountRhino Teepee Tent is perfect for kids who love bright colors.

This teepee can be used indoors or outdoors. It is easy to set up and take down. It will take you just minutes! The flexible tent poles and in-ground stakes keep it in place for extra safety.

The material of this kids teepee is a two side mesh. The mesh allows for good ventilation and keeps the bugs out. It also gives parents a full view of what’s going on inside. The teepee also has a waterproof bottom.

The MountRhino Teepee Tent comes with a carrying case, making it easy to transport. It is also lightweight, making it perfect for taking on the go.

Dimensions: 44” x 44” x 61”

The MountRhino Teepee Tent for Kids is perfect for ages 2 and up and comes in two designs:

Why do kids love teepee?

Kids love teepees because they are a fun and unique place to play. Teepees provide a safe and private space for kids to explore their imaginations. They are also great for indoor or outdoor use, making them perfect for any weather. Kids can use them as a fort, playhouse, or even a bed on those rainy days.

What do you put in a kids teepee?

A kids’ teepee can be filled with all sorts of fun things. Some parents put in a small mattress and pillows for their kids to sleep in, while others fill it with toys and games. You can also put in a small table and chairs for your kids to use as a play area. This is a great way to keep them occupied and out of trouble. You can also personalize your teepee by adding family photos or special mementos.

Kids teepee checklist

How to make kids’ teepee cozy? Here is what you need:

  • small mattress
  • blankets
  • pillows
  • toys
  • games
  • fairy lights
  • decorations

There you have it! Your essential checklist to get you started on creating the perfect teepee for your kids. With a little bit of creativity and imagination, you can turn a simple teepee into a magical space that your kids will love.

What to play in the teepee? Teepee fun ideas

What you put in the kids’ teepee depends, of course, on the age of your kids. You might want to include some building blocks, stuffed animals, and books for younger children. Older kids might enjoy playing games like checkers or chess. You can also use the teepee as a place to read stories or watch movies together.

There are endless possibilities when it comes to playing inside a teepee. Here are some ideas to get you started:

  • Pirate Adventures: Arrr mateys! Shiver me timbers! Transform your teepee into a pirate ship and let your little ones sail the seven seas in search of buried treasure.
  • Princess Castle: Let your little princesses live out their dreams of being a fairy tale princess in their very own teepee castle.
  • Secret Agent Headquarters: With a few sheets and some streamers, you can turn your teepee into the ultimate secret agent headquarters. Give your kids spy gadgets and missions to complete inside.
  • Indoor Camping: Set up a mini camping trip right in your living room. Pitch a small tent inside the teepee and tell stories around the pretend campfire.
  • Reading Nook: Create a cozy space for your kids to curl up with their favorite books. Add some pillows, blankets, and plush toys for extra comfort.

These are just a few ideas to get you started. With a little bit of creativity, you can come up with all sorts of fun things to do in your kids’ teepee. Let their imaginations run wild!

What age are kids teepees for?

Kids teepees are for kids of all ages. Whether your child is two or twelve, they will love having their very own special space to play in. Teepees are a great way to encourage creative play and imagination. They also provide a safe place for kids to explore new ideas and roles.

There is so much you can do with kids teepee that it is sure to be a hit with your kids, no matter their age.

Are teepees safe for toddlers?

Yes, teepees are safe for toddlers. They are made with sturdy materials and have no sharp edges. Teepees are also large enough for adults to enter, so you can always be nearby if your child needs you.

However, you need to remember a few things when using a teepee with toddlers.

  • Be sure to remove all small objects that could be choking hazards.
  • Ensure the teepee is set up in a safe location, away from open flames and other potential hazards.
  • Do not leave your child unattended in the teepee.

Also, it is a much better idea for toddlers to use a teepee indoors only.
Kids teepees are a great way for toddlers to explore their imaginations and have some fun. With a few simple precautions, your toddler will love being in their new teepee.

Still looking for a gift for kids?

Teepees make the perfect gift for any occasion. Birthdays, Christmas, Hanukkah, or just because, a teepee is sure to please any child. They are also a great addition to any playroom or bedroom. Kids will love having their special place to play, and you will love the extra storage they provide.

If you are still looking for the perfect gift for kids, you will find many great ideas on ComfyBummy! We specialize in everything that can make your child’s life more comfy and enjoyable, from kids’ furniture to toys and accessories. Visit our website today to find the perfect gift for your little one!

The post Kids Teepee – The Gift You Have Been Looking For! appeared first on Comfy Bummy.

Lawmakers Probe Early Release of Top RU Cybercrook

Aleksei Burkov, seated second from right, attends a hearing in Jerusalem in 2015. Image: Andrei Shirokov / Tass via Getty Images.

Aleksei Burkov, a cybercriminal who long operated two of Russia’s most exclusive underground hacking forums, was arrested in 2015 by Israeli authorities. The Russian government fought Burkov’s extradition to the U.S. for four years — even arresting and jailing an Israeli woman to force a prisoner swap. That effort failed: Burkov was sent to America, pleaded guilty, and was sentenced to nine years in prison. But a little more than a year later, he was quietly released and deported back to Russia. Now some Republican lawmakers are asking why a Russian hacker once described as “an asset of supreme importance” was allowed to shorten his stay.

A native of St. Petersburg, Russia, Burkov admitted to running CardPlanet, a site that sold more than 150,000 stolen credit card accounts, and to being a founder of DirectConnection — a closely guarded online community that attracted some of the world’s most-wanted Russian hackers.

But Burkov’s cybercriminal activities spanned far beyond mere credit card fraud. A 2019 deep dive into Burkov’s hacker alias “K0pa” revealed he also was co-administrator of the secretive Russian cybercrime forum “Mazafaka.” Like DirectConnection, Mazafaka’s member roster was a veritable “Who’s Who?” of the Russian hacker underground, and K0pa played a key role in vetting new members and settling disputes for both communities.

K0pa’s elevated status in the Russian cybercrime community made him one of the most connected malicious hackers ever apprehended by U.S. authorities. As I wrote at the time of Burkov’s extradition, the Kremlin was probably concerned that he simply knew too much about Russia’s propensity to outsource certain activities to its criminal hacker community.

“To my knowledge, no one has accused Burkov of being some kind of cybercrime fixer or virtual badguy Rolodex for the Russian government,” KrebsOnSecurity wrote in 2019. “On the other hand, from his onetime lofty perch atop some of the most exclusive Russian cybercrime forums, K0pa certainly would have fit that role nicely.”

Burkov was arrested in December 2015 on an international warrant while visiting Israel, and over the ensuing four years the Russian government aggressively sought to keep him from being extradited to the United States.

When Israeli authorities turned down requests to send him back to Russia — supposedly to face separate hacking charges there — the Russians imprisoned Israeli citizen Naama Issachar on trumped-up drug charges in a bid to trade prisoners. Nevertheless, Burkov was extradited to the United States in November 2019.

And if there were any doubts Issachar was jailed for use as a political pawn, Russian President Vladimir Putin erased those by pardoning her in January 2020, just hours after Burkov pleaded guilty in the United States.

In June 2020, Burkov was sentenced to nine years in prison. But a little more than a year later — Aug. 25, 2021 — Burkov was released and deported back to Russia. According to a letter (PDF) sent Monday by four Republican House lawmakers to White House National Security Advisor Jake Sullivan, U.S. Immigration and Customs Enforcement (ICE) officials escorted Burkov onto a plane destined for Moscow shortly after his release.

“An ICE spokesperson stated that Burkov is wanted by Russian authorities, and a DOJ spokesperson denied that a prisoner exchange took place,” the letter reads. “The decision to prematurely release Burkov is curious given the lengths to which the U.S. government went to secure Burkov’s arrest.”

The letter, signed by the ranking members of the House Judiciary, Homeland Security, Intelligence and Foreign Affairs committees, demanded to know why Burkov was released prematurely, and whether the U.S. received anything in return. The lawmakers also asked for a list of all Russian nationals convicted of crimes in the U.S. who were released early since President Biden took office.

Records show Burkov was in the custody of either Israeli or U.S. authorities for almost five years prior to his sentencing in 2020. At the time of his release, Burkov had already been incarcerated for nearly six years. So where did the other years of his sentence go?

That remains unclear, but it is possible he cut some sort of deal to lessen his sentence. On June 16, 2021, a “sealed pleading” was added to Burkov’s court record, followed by a sealed document entered on Aug. 18 — a week before Burkov’s deportation.

The motion to seal these and other documents related to the pleading was made by U.S. federal prosecutors, and those documents remain hidden from public viewing.

The Good, the Bad and the Ugly in Cybersecurity – Week 10

The Good

Eight months ago, Kaseya’s remote network management product (VSA) was abused in order to push REvil ransomware. The attacker(s) pushed a malicious update, effectively encrypting thousands of machines at hundreds of organizations. This week, the Justice Department announced the arrest of one of the alleged perpetrators. Yaroslav Vasinskyi, a 22 year old Ukranian national, was arrested in Poland and extradited to the United States. Charged with conspiracy to commit fraud, damage to protected computers, and conspiracy to commit money laundering, Vasinskyi faces a total 115 years in prison if convicted.

Additional unexpected gains are being made in the fight against ransomware as schisms in some of the biggest ransomware cartels have resulted in extensive leaks. The result is an unprecedented level of visibility into the inner workings of infamous groups like Conti and Trickbot. Soon after Conti announced its support for the Russian government’s invasion of Ukraine, a disgruntled insider released years worth of the group’s internal Jabber chat logs. The logs include a wealth of clues pointing to the identities of Conti operators previously known only by their online handles.

Researchers continue to dig into these chat logs, uncovering all sorts of details about the organization’s structure, leadership, and day-to-day operations. The mundane inner workings include office politics, management issues, and requests for paid leave. More notably, the leak also establishes explicit levels of coordination between Conti’s leadership and the Russian government in attempts to collect information on Alexey Navalny, a Russian opposition leader and anti-corruption activist.

While the Conti leaks are still being analyzed by researchers and journalists, the Trickbot leaks are being dropped in a more organized and purposeful fashion. A series of twitter accounts have been steadily disseminating dossiers of different Trickbot operators alongside their respective chat logs. In some cases, the PDFs associate an online handle with personally identifiable information including real names, dates of birth, passport numbers, addresses, and residential history.

Work has gone into these profiles, which makes us naturally suspicious of their provenance and reliability. In the case of both leaks, there’s the possibility of data being altered to misdirect investigators. Nonetheless, the leaks paint some explicit targets for law enforcement agencies to follow up on.

The Bad

There’s an onslaught of attacks attempting to disconnect Ukranians from the internet. This week has seen at least two instances of attacks on satellite internet operators servicing Ukraine. In an apparent attempt to disable critical communication channels, attackers have been bricking or jamming satellite modems. The first reports of satellite internet outages originated from Germany where early reports suggested that wind turbines were rendered inoperable due to a loss of internet service, apparent fallout from attacks aimed at Ukrainian customers. Viasat later confirmed that their KA-SAT service was down due to a ‘cyber event’. While technical details are sparse, it appears that the attackers may have pushed a malicious update to all KA-SAT modems, effectively bricking them. Similarly,  Starlink terminals were subjected to signal jamming.

Interfering with satellite internet connections isn’t the only attempt to isolate Ukrainian citizens and organizations. Reports indicate that Urktelecom, Ukraine’s main telco and internet service provider, was down nationwide for 40 minutes. This was followed by an announcement by Triolan, a Ukrainian internet service provider, of an extensive outage due to a ‘cyber attack’. The company addressed concerns via Telegram, referring to the attack as a ‘dastardly enemy strategy that is trying to […] disrupt the operation of information networks and leave people without communication’. There are sparse technical details at this time.

The Ugly

Firmware underlies all of our devices. It’s the layer of software that provides the low-level controls for the specific hardware we use. Unfortunately, the more security researchers pay attention to this software layer, the more it becomes clear that most firmware is riddled with serious vulnerabilities. This week, researchers at Binarly announced the discovery of 16 high-impact vulns in HP firmware, affecting laptops, desktops, point-of-sale systems, and edge computing nodes. If that’s not enough, this is the same team of researchers that announced the discovery of 23 vulnerabilities in a firmware software development kit (SDK) affecting 25 different vendors.

Firmware vulnerabilities are particularly troubling because components like the System Management Mode (SMM) have privileges greater than the operating system’s kernel. That concern is compounded by a lack of visibility into these components and the fact that attackers have not failed to exploit this porous layer. Multiple firmware rootkits have been discovered recently in-the-wild, including MoonBounce and ESPecter.

If you’re interested in learning more about firmware vulnerabilities, SentinelLabs researcher Assaf Carlsbad has published a six-part series introducing UEFI and SMM bug hunting. The series walks aspiring firmware security researchers through the process of dumping firmware, analyzing it statically and dynamically, fuzzing it, and identifying vulnerabilities. This week’s installment introduces a new plugin called ‘Brick’ that automates the discovery of SMM vulnerabilities with surprising results.

Report: Recent 10x Increase in Cyberattacks on Ukraine

As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks targeting Ukrainians.

John Todd is general manager of Quad9, a free “anycast” DNS platform. DNS stands for Domain Name System, which is like a globally distributed phone book for the Internet that maps human-friendly website names (example.com) to numeric Internet addresses (8.8.4.4.) that are easier for computers to manage. Your computer or mobile device generates DNS lookups each time you send or receive an email, or browse to a webpage.

With anycast, one Internet address can apply to many servers, meaning that any one of a number of DNS servers can respond to DNS queries, and usually the one that is geographically closest to the customer making the request will provide the response.

Quad9 insulates its users from a range of cyberattacks by blocking DNS requests for known-bad domain names, i.e., those confirmed to be hosting malicious software, phishing websites, stalkerware and other threats. And normally, the ratio of DNS queries coming from Ukraine that are allowed versus blocked by Quad9 is fairly constant.

But Todd says that on March 9, Quad9’s systems blocked 10 times the normal number of DNS requests coming from Ukraine, and to a lesser extent Poland.

Todd said Quad9 saw a significant drop in traffic reaching its Kyiv POP [point of presence] during the hostilities, presumably due to fiber cuts or power outages. Some of that traffic then shifted to Warsaw, which for much of Ukraine’s networking is the next closest significant interconnect site.

Quad9’s view of a spike in malicious traffic targeting Ukrainian users this week. Click to enlarge.

“While our overall traffic dropped in Kyiv — and slightly increased in Warsaw due to infrastructure outages inside of .ua — the ratio of (good queries):(blocked queries) has spiked in both cities,” he continued. “The spike in that blocking ratio [Wednesday] afternoon in Kyiv was around 10x the normal level when comparing against other cities in Europe (Amsterdam, Frankfurt.) While Ukraine always is slightly higher (20%-ish) than Western Europe, this order-of-magnitude jump is unprecedented.”

Quad9 declined to further quantify the data that informed the Y axis in the chart above, but said there are some numbers the company is prepared to share as absolutes.

“Looking three weeks ago on the same day of the week as yesterday, we had 118 million total block events, and of that 1.4 million were in Ukraine and Poland,” Todd said. “Our entire network saw yesterday on March 9th 121 million blocking events, worldwide. Of those 121 million events, 4.6 million were in Ukraine and Poland.”

Bill Woodcock is executive director at Packet Clearing House, a nonprofit based in San Francisco that is one of several sponsors of Quad9. Woodcock said the spike in blocked DNS queries coming out of Ukraine clearly shows an increase in phishing and malware attacks against Ukrainians.

“They’re being targeted by a huge amount of phishing, and a lot of malware that is getting onto machines is trying to contact malicious command-and-control infrastructure,” Woodcock said.

Both Todd and Woodcock said the smaller spike in blocked DNS requests originating from Poland is likely the result of so many Ukrainians fleeing their country: Of the two million people who have fled Ukraine since the beginning of the Russian invasion, more than 1.4 million have made their way to Poland, according to the latest figures from the United Nations.

The increase in malicious activity detected by Quad9 is the latest chapter in an ongoing series of cyberattacks against Ukrainian government and civilian systems since the outset of the war in the last week of February.

As Russian military tanks and personnel began crossing the border into Ukraine last month, security experts tracked a series of destructive data “wiper” attacks aimed at Ukrainian government agencies and contractor networks. Security firms also attributed to Russia’s intelligence services a volley of distributed denial-of-service (DDoS) attacks against Ukrainian banks just prior to the invasion.

Thus far, the much-feared large scale cyberattacks and retaliation from Russia haven’t materialized (for a counterpoint here, see this piece from The Guardian). But the data collected by Quad9 suggest that a great deal of low-level cyberattacks targeting Ukrainians remain ongoing.

It is unclear to what extent — if any — Russia’s vaunted cyber prowess may be stymied by mounting economic sanctions enacted by both private companies and governments. In the past week, two major backbone Internet providers said they would stop routing traffic for Russia.

Earlier today, the London Internet Exchange (LINX), one of the largest peering points where networks around the world exchange traffic, said it would stop routing for Russian Internet service providers Rostelecom and MegaFon. Rostelecom is Russia’s largest ISP, while MegaFon is Russia’s second-largest mobile phone operator and third largest ISP.

Doug Madory, director of research for Internet infrastructure monitoring firm Kentik, said LINX’s actions will further erode the connectivity of these large Russia providers to the larger Internet.

“If the other major European exchanges followed suit, it could be really problematic for Russian connectivity,” Madory said.

Microsoft Patch Tuesday, March 2022 Edition

Microsoft on Tuesday released software updates to plug at least 70 security holes in its Windows operating systems and related software. For the second month running, there are no scary zero-day threats looming for Windows users, and relatively few “critical” fixes. And yet we know from experience that attackers are already trying to work out how to turn these patches into a roadmap for exploiting the flaws they fix. Here’s a look at the security weaknesses Microsoft says are most likely to be targeted first.

Greg Wiseman, product manager at Rapid7, notes that three vulnerabilities fixed this month have been previously disclosed, potentially giving attackers a head start in working out how to exploit them. Those include remote code execution bugs CVE-2022-24512, affecting .NET and Visual Studio, and CVE-2022-21990, affecting Remote Desktop Client. CVE-2022-24459 is a vulnerability in the Windows Fax and Scan service. All three publicly disclosed vulnerabilities are rated “Important” by Microsoft.

Just three of the fixes this month earned Microsoft’s most-dire “Critical” rating, which Redmond assigns to bugs that can be exploited to remotely compromise a Windows PC with little to no help from users. Two of those critical flaws involve Windows video codecs. Perhaps the most concerning critical bug quashed this month is CVE-2022-23277, a  remote code execution flaw affecting Microsoft Exchange Server.

“Thankfully, this is a post-authentication vulnerability, meaning attackers need credentials to exploit it,” Wiseman said. “Although passwords can be obtained via phishing and other means, this one shouldn’t be as rampantly exploited as the deluge of Exchange vulnerabilities we saw throughout 2021. Exchange administrators should still patch as soon as reasonably possible.”

CVE-2022-24508 is a remote code execution bug affecting Windows SMBv3, the technology that handles file sharing in Windows environments.

“This has potential for widespread exploitation, assuming an attacker can put together a suitable exploit,” Wiseman said. “Luckily, like this month’s Exchange vulnerabilities, this, too, requires authentication.”

Kevin Breen, director of cyber threat research at Immersive Labs, called attention to a trio of bugs fixed this month in the Windows Remote Desktop Protocol (RDP), which is a favorite target of ransomware groups.

CVE-2022-23285, CVE-2022-21990 and CVE-2022-24503 are a potential concern especially as this infection vector is commonly used by ransomware actors,” Breen said. “While exploitation is not trivial, requiring an attacker to set up bespoke infrastructure, it still presents enough of a risk to be a priority.”

March’s Patch Tuesday also brings an unusual update (CVE-2022-21967) that might just be the first security patch involving Microsoft’s Xbox device.

“This appears to be the first security patch impacting Xbox specifically,” said Dustin Childs from Trend Micro’s Zero Day Initiative. “There was an advisory for an inadvertently disclosed Xbox Live certificate back in 2015, but this seems to be the first security-specific update for the device itself.”

Also on Tuesday, Adobe released updates addressing six vulnerabilities in Adobe Photoshop, Illustrator and After Effects.

For a complete rundown of all patches released by Microsoft today and indexed by severity and other metrics, check out the always-useful Patch Tuesday roundup from the SANS Internet Storm Center. And it’s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates: AskWoody.com usually has the lowdown on any patches that may be causing problems for Windows users.

As always, please consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these patches, please drop a note about it here in the comments.

Bassinet vs. Crib For Newborn – Which One To Choose?

There are many different types of cribs and baby beds available on the market, and each has its own set of pros and cons. Two of the most popular types are bassinets and cribs. So, which one should you choose for your newborn?

There is no right or wrong answer – it all depends on your individual needs and preferences. In this article, we will compare the two options – a bassinet and a crib – then, we will have a closer look at the best products on the market for each option

What is a bassinet?

A bassinet is a small, portable crib typically used for newborns. It is often shaped like an oval or rectangle, with sloped sides and a firm base. Bassinets are designed to be placed close to the parents’ bed so that the baby can be easily monitored and comforted. They are lightweight and easy to move around.

The main advantage of a bassinet is that it is small and portable – perfect for newborns who need close monitoring. It is also easy to use and clean, which is important for new parents who are already overwhelmed with new responsibilities.

The downside of a bassinet is that it can only be used for a limited time – usually until the baby reaches around four or five months old. After this age, the baby may start to outgrow the bassinet and will need to move to a larger crib.

Bassinets are not as common as cribs, so they may be harder to find in stores. However, there are online retailers that sell bassinets, and many of them offer free shipping.

Find the best bassinet for newborns

If you are looking for a bassinet for your newborn, we highly recommend the following products:

Chicco Close to You 3-in-1 Bedside Bassinet

The Chicco Close to You 3-in-1 Bedside Bassinet is a great option for new parents. It is a small and lightweight bassinet that can be easily moved around the house, and it can be used as both a standalone bassinet or attached to the side of the parents’ bed. The mattress is covered in soft, breathable fabric, and the bassinet has a built-in nightlight and music player. All of that creates a peaceful environment for your little one.

Is it time for a diaper change? Simply turn the mattress over to reveal a waterproof changing pad and lower the bassinet walls for simple access while in use as a changing station. That is what we call convenience! The zip-off fabric of the bassinet and mattress is simple to remove and machine washable. That makes it very easy to use and clean – an excellent option for busy new parents.

Delta Children Sweet Dreams Bassinet

The Delta Children Sweet Dreams Bassinet is also a great option for newborns. It is made of sturdy wood and features a gentle slope for added comfort. The bassinet has a soft, quilted fabric liner and comes with a matching canopy and bedding set. It also has a built-in music player that plays different lullabies to soothe your baby to sleep. The breathable mesh sides for airflow and visibility and an electronic pod with vibration and nightlight help a baby (and parents) sleep better.

The bassinet is created with long-lasting materials to ensure that your baby is safe. In addition, it is thoroughly tested to guarantee that they comply with or exceeds all industry safety regulations.

The Sweet Dreams Bassinet is easy to assemble and use, and it is a great option for parents who want a stylish and comfortable bassinet for their newborn.

This bassinet is designed to accommodate babies weighing less than 30 pounds (approximately 0-5 months old).

Maxi-Cosi Iora Bedside Bassinet

With the Maxi-Cosi Iora bassinet, your child may rest comfortably at home or on the road – within your arms’ reach at all times. This bassinet has multiple features that make it great for short and long naps:

  • supportive mattress
  • Side panels, made of breathable mesh fabric, allow air to flow through while also providing a quick peek at your baby.
  • Adjustable height – perfect for all bed types.

For those times when your baby starts crying in the middle of the night, you may simply move the bassinet closer to the bed to offer comfort and care.

The Iora bassinet is lightweight and easy to move around your home, making it perfect for travel. The big storage basket underneath lets you take everything you need with you on your journey. The bassinet folds up easily for compact storage and comes with a convenient shoulder bag for transport.

This bassinet is designed to accommodate babies weighing up to 20 pounds (approximately 0-6 months old).

Fisher-Price Soothing Motions Bassinet

The Fisher-Price Soothing Motions Bassinet is one of the most popular bassinets on the market. It has several features that make it perfect for newborns, including:

  • multi-directional soothing motions
  • a built-in mobile with three soft toys
  • two levels of calming vibrations
  • plays ten different melodies

The Soothing Motions Bassinet has everything a parent could want to help their infant relax and drift off to sleep! The gentle motions and vibrations, along with the soft music and colorful mobile, create a soothing environment for your little one.

This bassinet is designed to accommodate babies weighing up to 20 pounds (approximately 0-6 months old). It folds up easily for compact storage.

The Fisher-Price Soothing Motions Bassinet is perfect for parents who want a bassinet with all the bells and whistles.

Ingenuity Ity Snuggity Snug Bedside Baby Bassinet

Cradle your baby with the Ity by Ingenuity Snuggity Snug bassinet. The Snuggity Snug bassinet is designed to give your baby the utmost comfort. The soft, plush fabric and gentle vibrations help to soothe and relax your child. The easy-to-remove canopy provides shelter from bright lights, and the deep cradle keeps your baby comfortable and secure.

The Snuggity Snug bassinet also has a built-in nightlight for late-night feedings and diaper changes. The bassinet can easily be moved from room to room, thanks to the wheels.

This bassinet is designed to accommodate babies weighing up to 20 pounds (approximately 0-6 months old).

Graco My View 4 in 1 Bassinet

The Graco® My View™ 4-in-1 Bedside Bassinet offers four different ways to use:

  • The raised bedside bassinet perfectly positions the baby at eye level
  • The bassinet lowers to crib-level for infants and is removable for use anywhere!
  • A portable bassinet, perfect for traveling
  • Spacious toddler bassinet

You can safely say that the Graco® My View™ 4-in-1 Bedside Bassinet grows with your child and will be your companion for years to come. It has a sturdy frame and wheels that make it easy to move around your home. The bassinet also has storage pockets on either side to keep your baby’s essentials close by.

This bassinet is designed to accommodate babies weighing up to 30 pounds (approximately 0-5 months old). It folds up easily for compact storage.

The Graco® My View™ 4-in-1 Bedside Bassinet is perfect for parents who want a bassinet that can be used throughout infancy and toddlerhood.

HALO BassiNest Flex

The HALO BassiNest Flex is the perfect solution for parents who want a bassinet that can be used anywhere. It’s lightweight and portable, making it ideal for when you’re on the move, whether it’s a vacation or visiting family.

The greatest feature of the HALO BassiNests Flex is its lowering bedside wall, which is especially useful for nursing mothers or recovering from a C-section. The wall can be easily lowered and raised with one hand, making it easy to access your baby.

JMPA-certified and compliant with all current safety standards, the HALO BassiNest Flex is a safe and comfortable place for your little one to sleep.

This bassinet is designed to accommodate babies weighing up to 20 pounds (approximately 0-6 months old).

Delta Children Deluxe Sweet Beginnings Bedside Bassinet

With Delta Children’s classically designed Deluxe Sweet Beginnings Bassinet, you can give your infant a safe and comfortable place to sleep or rest. The bassinet features a sturdy frame, wheels for easy mobility, and a soft and comfy mattress.

This bassinet is equipped with a nightlight and a music module that plays soothing lullabies. It has a large dual storage basket underneath, making it ideal for storing linens, diapers, and necessary newborn supplies.

The Delta Children Deluxe Sweet Beginnings Bedside Bassinet is JPMA certified and compliant with all applicable safety standards. This bassinet is recommended for babies 0-5 months.

Baby Delight Beside Me Dreamer Bassinet & Bedside Sleeper

The Baby Delight Beside Me Dreamer Bassinet & Bedside Sleeper is perfect for keeping your little one close by during the night. The Beside Me Dreamer Bassinet can be used as both a bassinet and a bedside sleeper, making it a versatile addition to any nursery.

In Bassinet mode, your baby is enveloped in breathable mesh walls that keep air flowing while also providing the baby with its own space. Simply unzip the side panel closest to your bed to discover the Bedside Sleeper mode. Now you can easily reach over and comfort or nurse your baby without having to get out of bed.

The Baby Delight Beside Me Dreamer Bassinet & Bedside Sleeper is entirely safe. The 6-position height adjustment can be used to adapt the sleeper height to most adult beds, and the attached straps safely secure the Bedside Sleeper to your adult bed, ensuring it stays snug and in place.

The sleeper features a soft and comfortable mattress, as well as a canopy to provide your child with privacy and shelter from bright lights. The Baby Delight Beside Me Dreamer Bassinet & Bedside Sleeper also has a vibration feature that can be used to soothe and relax your child.

Wheels on the base make it easy to move the sleeper from one room to the next, and a locking mechanism keeps it in place when you’re not using it.

This sleeper is designed for babies weighing up to 20 pounds (approximately 0-6 months old).

What is a baby crib?

A crib is a larger, more permanent baby bed typically used for infants until about two years old. It is rectangular or square, with high sides and a sturdy base. Cribs are designed to be placed in a child’s bedroom and can be used for both sleeping and playing.

The main advantage is that it can be used for a more extended time than a bassinet. It is also larger, which means the baby has more space to move around and sleep comfortably.

The downside of a crib is that it is bulky and takes up more space in a child’s room. It can also be challenging to move from one room to another, which is a problem if you need to relocate.

The best baby cribs

If you prefer to invest in a baby crib, here are the best ones. You should definitely have a look at those:

Delta Children Sloane 4-in-1 Acrylic Convertible Crib

This crib is an excellent option for parents who want a versatile piece of furniture. It can be converted into a toddler bed, daybed, and full-size bed, making it a great long-term investment.

The Delta Children Sloane 4-in-1 Acrylic Convertible Crib is the ideal modern nursery choice for your little one! The clear acrylic spindles provide an open, airy atmosphere, while the splayed bronze feet add a touch of class to the clean lines.

The adjustable mattress height on this crib also allows you to use it for many years – as your child grows, you can simply lower the mattress to keep them in the crib longer. This crib is also JPMA certified and meets all safety standards.

The Delta Children Sloane 4-in-1 Acrylic Convertible Crib is available from Amazon.

Graco Stella 4-in-1 Convertible Mini Crib

The Graco Stella 4-in-1 Convertible Mini Crib is ideal for parents who don’t have a lot of space but still desire something extra. This crib is small and compact but can be converted into a toddler bed, daybed, and full-size bed.

The Graco Stella 4-in-1 Convertible Mini Crib also comes with a mattress, which is a plus. A JPMA Certified, premium 2.75-inch thick foam mattress with a water-resistant cover and breathable core is a quality addition to the purchase.

The Graco Stella crib is made of pine wood straight from New Zealand and is finished with non-toxic, lead, and phthalate-safe paint. A beautiful finish makes it a stylish addition to any room.

The Graco Stella 4-in-1 Convertible Mini Crib is designed to fit your kid from infancy through childhood, with an adjustable mattress foundation with three height settings. If desired, the Stella transforms from a tiny crib to a daybed and twin bed with a headboard and footboard.

The Graco Stella 4-in-1 Convertible Mini Crib is available from Amazon.

Storkcraft Princess 4-in-1 Fixed Side Convertible Crib

The Storkcraft Princess 4-in-1 Fixed Side Convertible Crib is a stylish and affordable option for parents looking for a convertible crib. This crib can be converted into a toddler bed, daybed, and full-size bed.

The Storkcraft Princess 4-in-1 Fixed Side Convertible Crib is made of wood and is finished with a non-toxic, lead, and phthalate-safe paint. It also meets all safety standards.

The crib comes with an adjustable mattress height, making it a great option for newborns and toddlers.

The design of this crib is also very stylish and will complement any child’s room. Definitely worth a princess!

Delta Children Abby Convertible Crib and Changer

Do you want your baby to feel comfortable but still save space? Delta Children Abby Convertible Crib and Changer is a great choice! It is a convertible crib that adapts to your child’s stage and growth, as well as a handy changing table and even a storage piece. The Abby Convertible Crib ‘N’ Changer by Delta Children has so many applications you will be hard-pressed to find a better all-in-one crib solution.

The crib is designed with beautiful curves and a glossy white finish to complement any nursery décor. The changer top has generous space for all of your baby’s changing supplies, plus roomy drawers for storage.

To adapt to changing demands, the crib may be converted to a toddler bed, daybed, and full-size bed. It includes three adjustable mattress heights, as well as a conversion option for when your child outgrows it.

The Delta Children Abby Convertible Crib N Changer is a long-lasting bed that will provide your kid with a secure and adaptable sleeping environment.

Dream On Me Chelsea 5-in-1 Convertible Crib

The Dream On Me Chelsea 5-in-1 Convertible Crib is a versatile and stylish crib that can be converted into a toddler bed, daybed, and full-size bed. It is also JPMA certified and meets all safety standards.

The Chelsea 5-in-1 Convertible Crib has a beautiful sleigh design that will complement any room. It is made of wood and comes with a mattress. Every component of this baby crib is of the highest quality: the wood is sturdy, and the finish is non-toxic, lead, and phthalate-safe. The mattress is also JPMA certified and has a water-resistant cover and breathable core.

The crib can be converted into different beds at three different adjustable mattress heights. This makes it perfect for both newborns and toddlers.

The Dream On Me Chelsea 5-in-1 Convertible Crib is available from Amazon.

Graco Hadley 4-in-1 Convertible Crib with Drawer

A classic, modern, and yet innovative solution for the nursery – does that sound good? It’s not a mirage; it’s the Graco Hadley 4-in-1 Convertible Crib with Drawer. This crib can be converted into a toddler bed, daybed, and full-size bed. It also features a beautiful sleigh design in various wood finishes to fit any nursery style.

The Graco Hadley crib is made of New Zealand pine wood and non-toxic coatings, making it sturdy enough to last through babyhood, toddlerhood, and childhood.

The crib features a drawer beneath the crib that is perfect for storing diapers, wipes, and other supplies. It also has three different adjustable mattress heights to accommodate your growing child.

Babyletto Hudson 3-in-1 Convertible Crib with Toddler Bed Conversion Kit

The best-selling Babyletto Hudson 3-in-1 Convertible Crib with Toddler Bed Conversion Kit is stunningly designed and expertly crafted. This convertible crib can be used from infancy through childhood, as it converts into a toddler bed, daybed, and full-size bed.

The Babyletto Hudson 3-in-1 Convertible Crib with Toddler Bed Conversion Kit is made of New Zealand pine wood and finished with a non-toxic, lead, and phthalate-safe paint. It also meets all safety standards.

The crib has an adjustable mattress height that can be used for both newborns and toddlers. The crib’s design is simple and elegant, with clean lines that will complement any nursery décor.

The crib also includes a toddler bed conversion kit, making it perfect for toddlers ready to move on from the crib.

Delta Children Emery 4-in-1 Convertible Baby Crib

Sometimes simple is just what you need. The Delta Children Emery 4-in-1 Convertible Baby Crib is a beautiful and classic crib that can be converted into a toddler bed, daybed, and full-size bed. But don’t let its simple design fool you – this crib is packed with features that make it perfect for your child.

The Delta Children Emery 4-in-1 Convertible Baby Crib is made of wood and finished with a non-toxic, lead, and phthalate-safe paint. It meets all safety standards and is JPMA certified.

The crib has three different adjustable mattress heights that can be used for both newborns and toddlers.

The design of the crib is simple and elegant, with clean lines that will complement any nursery décor.

The Delta Children Emery 4-in-1 Convertible Baby Crib is available from Amazon.

Delta Children Simmons Kids Asher 6-in-1 Convertible Crib with Toddler Rail

Look at the stylish and beautiful curves and shiplap-inspired headboard of the Asher 6-in-1 Convertible Baby Crib by Simmons Kids! This crib not only looks great, but it is also functional and will grow with your child.

The crib features three adjustable height settings that enable the bed to be lowered as your child grows. You can quickly transform it from a crib to a toddler bed, sofa, daybed, full-size bed with headboard, or full-size bed with headboard and footboard. This multifunctional crib will take you from the nursery to high school and beyond. It’s the only bed your child will ever need.

The baby crib is made of high-quality materials and construction durable and safe for your baby.

The Asher 6-in-1 Convertible Baby Crib is available on Amazon.

Dream On Me Jayden 4-in-1 Mini Convertible Crib And Changer

That baby crib is not only practical but also stylish! Dream On Me Jayden combines all the features a modern parent would love. It is a crib, a changer and a drawer in one! If you are looking for a convertible crib with a lot of storage space, then this is the one you need!

Dream On Me Jayden Crib will be a great addition to your interior:

  • The crib features a beautiful vintage design
  • It is made of solid wood and composites for strength and durability

We highly recommend this crib for parents who are looking for a beautiful and durable piece of furniture that will last for many years. The crib can be converted to a toddler twin-size bed afterward.

If you are looking for a crib that will grow with your child, the Dream On Me Jayden is the perfect option! It is a great value for your money.

Bassinet Vs. Crib: What’s The Difference?

You should be aware of a few key differences between bassinets and cribs before deciding. Here are some of the most important ones:

  • Bassinets are smaller and more compact than cribs, ideal for smaller spaces.
  • Cribs are larger and provide more space for a baby to sleep.
  • Bassinets typically come with a canopy and other accessories that can make them more comfortable for newborns.
  • Cribs often come with features like teething rails and changing tables that can be useful for parents.
  • Bassinets are typically used for newborns until they are about four or five months old.
  • Cribs can be used for children up to two years old.
  • Bassinets can be more difficult to find in stores than cribs.

What should you look for before buying a bassinet or crib?

When choosing a bassinet or crib, you should keep a few things in mind. Here are some of the most important ones:

  • Both bassinets and cribs should be certified by the Juvenile Products Manufacturers Association (JPMA). This means that they have been tested and meet all safety standards.
  • Make sure that the bassinet or crib you choose is approved by the Consumer Product Safety Commission (CPSC).
  • Bassinets and cribs should be made of sturdy materials that can withstand wear and tear.
  • Make sure that the bassinet or crib has a firm, flat surface to sleep on.
  • Bassinets should be lightweight and easy to move around.
  • Cribs should be stable and difficult for a baby to climb out of.
  • Bassinets and cribs should come with instructions on how to use them properly.
  • Bassinets and cribs should be easy to clean.

Is a Bassinet or a Crib Better for My Baby?

The debate between bassinet vs. crib for newborns often comes down to personal preference, as both have their benefits.

One of the main benefits of a bassinet is that it is smaller and more compact than a crib, making it ideal for smaller spaces. This also means it is easier to move around than a crib, which can be a plus if you plan to take your baby on trips. Additionally, bassinets typically come with a canopy and other accessories that can make them more comfortable for newborns.

On the other hand, cribs are larger and provide more space for a baby to sleep. This can be important for newborns who are still adjusting to life outside the womb. Additionally, cribs often come with features like teething rails and changing tables that can be useful for parents.

Ultimately, the decision between bassinet vs. crib for newborns depends on personal preference. A bassinet may be the better option if you have a smaller space. If you have more room or want your baby to have more freedom to sleep, a crib may be better. Whichever you choose, make sure that it is certified by the Juvenile Products Manufacturers Association (JPMA) and complies with all safety standards.

The post Bassinet vs. Crib For Newborn – Which One To Choose? appeared first on Comfy Bummy.

Internet Backbone Giant Lumen Shuns .RU

Lumen Technologies, an American company that operates one of the largest Internet backbones and carries a significant percentage of the world’s Internet traffic, said today it will stop routing traffic for organizations based in Russia. Lumen’s decision comes just days after a similar exit by backbone provider Cogent, and amid a news media crackdown in Russia that has already left millions of Russians in the dark about what is really going on with their president’s war in Ukraine.

Monroe, La. based Lumen [NYSE: LUMN] (formerly CenturyLink) initially said it would halt all new business with organizations based in Russia, leaving open the possibility of continuing to serve existing clients there. But on Tuesday the company said it could no longer justify that stance.

“Life has taken a turn in Russia and Lumen is unable to continue to operate in this market,” Lumen said in a published statement. “The business services we provide are extremely small and very limited as is our physical presence. However, we are taking steps to immediately stop business in the region.”

“We decided to disconnect the network due to increased security risk inside Russia,” the statement continues. “We have not yet experienced network disruptions but given the increasingly uncertain environment and the heightened risk of state action, we took this move to ensure the security of our and our customers’ networks, as well as the ongoing integrity of the global Internet.”

According to Internet infrastructure monitoring firm Kentik, Lumen is the top international transit provider to Russia, with customers including Russian telecom giants Rostelecom and TTK, as well as all three major mobile operators (MTS, Megafon and VEON).

“A backbone carrier disconnecting its customers in a country the size of Russia is without precedent in the history of the internet and reflects the intense global reaction that the world has had over the invasion of Ukraine,” wrote Doug Madory, Kentik’s director of Internet analysis.

It’s not clear whether any other Internet backbone providers — some of which are based outside of the United States — will follow the lead of Lumen and Cogent. But Madory notes that as economic sanctions continue to exact a toll on Russia’s economy, its own telecommunications firms may have difficulty paying foreign transit providers for service.

Ukrainian leaders petitioned the Internet Corporation for Assigned Names and Numbers (ICANN) — the nonprofit organization charged with overseeing the global domain name system — to disconnect Russia’s top-level domain (.ru) from the Internet. ICANN respectfully declined that request, but many technology giants, including Amazon, Apple and Microsoft, have moved on their own to suspend new business in the country.

Meanwhile, Russia recently cracked down on the last remaining vestiges of a free press within its borders, passing a new law that threatens up to 15 years in jail for anyone who publishes content that refers to the conflict in Ukraine as a “war” or “invasion.”

As Neil MacFarquhar writes for The New York Times, what little coverage there is on Russian television networks about the invasion does not include any footage of the devastation wrought by Russian troops on the Ukrainian citizenry. At the same time, the Russian government has blocked Facebook and partly blocked Twitter, while other platforms like TikTok have suspended services in the country.

“To spend several days watching news broadcasts on the main state channels, as well as surveying state-controlled newspapers, is to witness the extent of the Kremlin’s efforts to sanitize its war with the Orwellian term ‘special military operation’ — and to make all news coverage align with that message,” MacFarquhar wrote.

The Washington Post, which was the first to report on Cogent’s decision last week, wrote that these independent actions by private tech companies collectively “will leave Russians more dependent than ever on government propaganda that already dominates the nation’s newspapers and broadcast stations, leaving few ways to access independent sources of news at a time when the country has entered a severe political crisis.”

In a blog post titled “Why the World Must Resist Calls to Undermine the Internet,” Internet Society President Andrew Sullivan said cutting a whole population off the Internet will stop disinformation coming from that population — but it also stops the flow of truth.

“Without the Internet, the rest of the world would not know of atrocities happening in other places,” Sullivan wrote. “And without the Internet, ordinary citizens of many countries wouldn’t know what was being carried out in their name. Our best hope, however dim, is that those supporting an aggressive regime will change their support. More information can help, even as disinformation circulates. We need a better understanding of what is and is not disinformation.”

There is another — perhaps less popular — camp, which holds that isolating Russia from the rest of the Internet might be THE thing that encourages more Russians to protest the war in Ukraine, and ultimately to take back control of their own country from its autocratic and kleptocratic leaders.

Not long after Russia invaded Ukraine, I heard from an old pen-pal in Ukraine: Sergey Vovnenko, a.k.a. “Flycracker,” a.k.a the convicted Ukrainian cybercriminal who once executed a plot to have me framed for heroin possession. Vovnenko did his time in a U.S. prison, left Fly behind, and we have since buried the hatchet. He’s now hunkered down in Lviv, Ukraine, which is serving as a major artery for refugees seeking shelter outside Ukraine’s borders.

These days, Vovnenko says he is working with many sympathetic hackers to fight the Russians online. Asked what he thought about the idea of Russia being isolated from the rest of the Internet, Vovnenko said it couldn’t happen soon enough given the Russian government’s new media blitz to cast the war in a patriotic light.

“I think they should be disconnected, maybe Russian people will rebel against Putin after that,” he said.

Podcast: Cyber War Elements In The Ukrainian Conflict | Hosted by the Alperovitch Institute for Cybersecurity Studies

In a special event hosted by the Alperovitch Institute, some of cyber security’s most distinguished speakers share their thoughts on the unfolding cyberwar in the midst of the Ukrainian conflict. Aside from the DDoS attacks and website defacements, and a sense of heightened alert around the globe, there has so far been a lack of devastating attacks. Are the APTs on all sides keeping their powder dry, or is there something else going on?

With questions and contributions from Chris Krebs, JD Work, and John Scott Railton and moderated by Thomas Rid, listen to the thoughts and insights of speakers such as SentinelLabs’ Principal Threat researcher Juan Andres Guerrero-Saade, Olga Belogolova (Meta/Georgetown University), Daniel Moore (Meta/King’s College London), Gabby Roncone (Mandiant/Georgetown University), Ben Read (Mandiant/Georgetown University), Robert Lee (Dragos), Lee Foster, and Dimitri Alperovitch (Silverado Policy Accelerator).

With thanks to Sean Ainsworth for recording this event.

Click ‘play’ to listen!


The War in Ukraine and Cyber Operations by Alperovitch Institute for Cybersecurity Studies: Audio automatically transcribed by Sonix

The War in Ukraine and Cyber Operations by Alperovitch Institute for Cybersecurity Studies: this mp4 audio file was automatically transcribed by Sonix with the best speech-to-text algorithms. This transcript may contain errors.

Thomas Rid:
Evening, it’s 8:00 p.m. Eastern. I understand that there are a couple of people here from the UK and perhaps even further east, so welcome especially to you, because it’s very late where you are. So I’m Thomas Reed, Professor of Strategic Studies at Johns Hopkins University. I write books about technology and conflict, and we are going to talk about. Um, this big question out there, the surprise out there. Where’s the cyber war in Ukraine? This is a question that I haven’t raised, but a lot of people have raised. We’ve seen a couple of High-Profile press stories and Wall Street Journal The Economist, but really asked where like, why have we not seen a more high profile cyber attacks, computer network operations just before the conflict, just before the start of the war, at the invasion and in the early phases, especially in Ukraine, especially in that country that has seen some of the most sophisticated, the most. A costly cyber attacks in the past seven years, depending on when you start counting. So. The way this is going to run this, this space, it is, it works like this. We’re basically going to talk amongst ourselves for something like 45 minutes to an hour. We we this meaning sorry if the only thing that’s getting. Oh, so we are. When I say we, I’m referring to a group of people that are, you know, around the Alperovitch Institute at Johns Hopkins, it’s a new research institute that was that we founded and are still starting up right now on cyber security studies.
Very generously endowed by Dmitri Alperovitch, who is with us tonight, is one of the participants in this conversation. Thank you, Dimitri, for coming tonight, especially. And so moving for the next hour will be discussing four questions. First question is. Essentially, where is that cyberwar, what has happened so far in terms of actual observable computer network operations in the context of the Ukraine war? So first state of play, what’s happening? What do we know? Second question and we’ll do each one in a round amongst this group. I’ll introduce them in a moment. So the second question is, well, what may happen or version of that question, what perhaps has happened already, but we just don’t know about it yet. So what kind of cyber attacks should we actually expect in a situation like this? The third question, then, will be how do these operations, these covert digital operations or not? So covert operations, how do they fit into the wider picture of the campaign of the war? How really, how important are they? What’s their role in the bigger picture? And finally, if we have time after that, we are going to. Open for a conceptual question, what does all that mean for the future conversation about computer network operations, cyber conflict? All right. So I would introduce the speakers as they speak whenever they speak for the first time, just so you don’t have to listen through a long round of introductions.

And let’s start with that first question. What is what have we seen so far in terms of computer network operations in Ukraine and in order to tackle that question? I will just cold call on one of our speakers and why don’t I start with Danny Moore, Daniel Moore? He Danny is my former student, a PhD student, also a former Israeli IDF officer who is an extraordinary set of experience, now works at Meta, but obviously here speaks only for himself. He has a book out soon that is called offensive cyber operations, so he I couldn’t think of anybody better to be the first one to jump in here. Danny, what have we seen so far? All right.

Daniel Moore:
Hi, everyone. So what have we seen so far is actually not that much. I know that there’s a lot of noise and a high volume of attacks comparatively more than we usually see. But the vast majority of what we’ve been seeing is a combination of either denial of service attacks or or wiper operations, which I think some of my other friends here can more fully to. But as a sum total of operation, it’s quite less than we have expected. And principally, I think, one of the biggest gaps in regards to our expectations and clearly this campaign has this war has changed or tones our expectations in many ways. But on the cyber side, we a lot of us expected information dominance as an early objective for the Russian forces to tackle critical national infrastructure and communication networks. Cell networks control the narrative through this. It is conducive to what they would want to do before. And I’m admittedly quite surprised that they haven’t even attempted to do this now. But I think it’s important, and a lot of folks here would agree that what we have seen is not necessarily indicative of what there is. We do have a perspective bias, both because we’re consistently being targeted by influence operations from both sides, but also because whatever happens on the military side, we might not have visibility into. So long story short, we see a volume of things, maybe not the quality or quantity that we would have wanted and maybe not as tethered to specific military objectives as we would expect.

Thomas Rid:
Interesting. I’m sure as I look through the speakers list, I mean, especially when you come to mind because you have just spent some good chunk of time last week, I think, or earlier this, I’m losing track of time, spent some time investigating one of the pieces, one of the events, malware samples that we’ve seen earlier in the campaign. Can you can you sort of put that into a little bit of context for us and just to introduce you 100 Guerrero and many of you will know him now with SentinelOne one one of the most respected EPP hunters, I think in the wider community. So delighted to have you.

Juan Andres Guerrero-Saade (JAG-S) :
Thank you, Thomas. So, yeah, thanks everybody for joining, and we finally were able to kind of straighten out most of the speakers here. So, you know, it’s kind of an odd question for me to talk about know where is a cyber war? Have we not seen it? Because, I mean, to some extent, it’s been a more or less exciting or eventful conflict on the side of cyber. For those of us that have been really sort of knee deep in the different operations, different pieces of malware that have been coming out, I’m thinking, you know, mostly Ben Reed is here. I’m sure his team has dealt with quite a bit, Gabby as well. I see Silas in the crowd. Tom, who works with me, we’ve all been swamped with all kinds of different ops, mostly around these different pieces of wiper malware to talk about sort of the diversity of threats that we have here. And I know that recently there was a graphic that I retweeted. There are at least five or six different groups that we see active against Ukraine with a variety of different operations. Whether it’s, you know, disinfo ops, whether it’s wiper malware or hack and leak operations and, you know, phishing and so on. So to some extent, I mean, there is quite a bit of cyber activity as as enabler as a support to what’s going on.
But I think we’re also kind of in a strange period of objection where there have been so much talk of cyber war as its own thing that I think we we kind of sold ourselves on this mirage of what cyber war quote unquote would look like. And instead, what we’re seeing is sort of the disappointing reality of war, which includes cyber components but really isn’t led and sort of entirely mired in them.

So I think great, great observation from you there earlier at the top that. If we look to zoom in to more closely into the kinds of events that we’ve seen, then perhaps really what we’re looking at is that the press coverage one for one, but also perhaps the just the stress of the war itself for all people in Ukraine, including obviously incident responders has probably. Created a bit of fog of war and the cyber investigations context, and many of us have simply not had missed some of some of some of the interesting events that have happened in this context. The other person that comes to mind here, as I look at our speakers, is Rob Lee, who probably through his company. Drago’s is the CEO of Greg and an old friend of many of us here probably has some good visibility into a set of events that some of us, most of us will not have. So, Rob, what are what are you seeing?

Robert Lee:
Yeah, I think in Ukraine leading up to the conflict, there was a lot of different kind of pre-positioning kind of activity that was taking place, but of course, it never manifested in anything that we would observe. I think to many of the comments that were made in this group, whether in Chad or here tonight, I think there’s been maybe an overestimation by Russia if its capabilities and going into the conflict and not relying on certain cyber capabilities. Maybe they didn’t feel they had a need. Maybe it wasn’t a reliable option. I mean, I think, you know, I look back to my time in the military and we always the cyber folks, if you will, always wanted to present commanders with cyber options because that was our goal and it was a focus. But when you’re sitting next to somebody or you’re presenting to a general and saying, Hey, I’ve got a 70 percent chance that I can take down that integrated defense system and we need three months prep and here’s what we can do. And the pilot standing next to you says, Yeah, I can like take off right now and bomb it in two hours. And with a ninety eight percent confidence here, those commanders are generally going to go for those non cyber capabilities. So I think cyber as a tool ends up being really, really helpful pre-conflict, potentially in conflict. But I think when bombs start dropping, there’s no amount of anything that we associate with cyber that’s actually all that relevant in terms of what people are actually clearing now outside of Ukraine, there’s a lot more activity going and maybe we’ll get to that later. But we started seeing some groups that the United States government has attributed to Russia starting to target just at a high level, not anything that would say compromises and taking down systems, but starting reaching out, doing reconnaissance, kind of targeting key electric and liquid natural gas sites around the United States starting back in October. And we ended up informing the community and federal government on that then. And I think that raised a lot of concern of potential future efforts, not saying that anything is going to come to bear. But obviously it represents a concern when you see some of those capable groups starting to be real precise in the places that they’re hitting.

So bottom line, there’s maybe a lot more pre-positioning that has happened in various networks and various targets that we simply haven’t seen revealed publicly yet. And so presumably a lot more will come up come out over the next weeks and months. When you raise your hand and Dmitri as well.

Juan Andres Guerrero-Saade (JAG-S) :
Well, what we’re talking about visibility, and I think this is sort of an important near and dear point to those of us that are sort of trying to work on the threat until space trying to understand the situation. We had our clearest visibility as to what was happening in Ukraine in the weeks leading up to it in the hours leading up to the invasion. It was actually a really interesting period as we became aware of Hermetic wiper and some of these other components around, I want to say four or five p.m. Eastern Time with the invasion starting at what I want to say around midnight or two a.m. our time. And it was sort of this interesting tempo where you could see reports of the attacks increasing. But I think that was the end of having any kind of fidelity of observation and telemetry into what was going on there and sort of important to understand the medium for cyber attacks and for any kind of cyber components as being so tragically tied into internet infrastructure electricity. Just the general availability of systems and even just people on those machines to click and make mistakes and so on. I think the kind of banality of cyberwar is precisely that. You know, once bombs and bullets really come into play, the reliability of cyber goes from that 70 percent that Rob spoke of to perhaps a meager 20 or 30 percent. Let’s see if the systems are still up. Let’s see if we can even get there anymore. And that’s where it kind of all starts to fall off for us in the telemetry side.

Thomas Rid:
Yeah, great points, Dmitry. You also raised your hand and then Ben.

Dmitri Alperovitch:
Yeah, I think it’s important to kind of put things in perspective here that one of the things that cyber is just fantastic at right is the ability to cause damage to the ability to do disruption, the ability to do cohesion in that gray zone between peace and war, where you have conflict between states, but they’re not quite at the kinetic stage and you’re trying to keep things below that level of threshold of actually engaging in a war, but still nevertheless impact economic pain, impact paying politically and so forth through interference campaigns. Once the bombs actually start flying, as some of the folks have said, cyber becomes much less useful. It may still be useful at a tactical level, and what I did expect before the war is that we might see very specific attacks on the communications infrastructure, and we certainly saw some and we can talk about that later, but not to the extent that I expected, in part because I did not expect the Russians to be so bad at having secure communications between their own units that they ended up relying on Ukrainian communication systems, including their cell phone communications, to actually keep in touch with each other. And as a result, them taking down the Ukrainian communications networks became much less interesting and appealing. But the other thing that I thought that they might do is is target the mobilization databases, and I think that we need to appreciate just how badly the assumptions have been on the part of the Russians about this whole war that it is very clear now in terms of their initial actions in the first couple of days of conflict that they really thought that they could just roll into Kiev with a company of armored vehicles and the Ukrainians would surrender that there would be no resistance, that the Ukrainian armed forces would just dissipate. So they really didn’t plan on cyber or much of anything else. For that matter. Very little air power, for example, was used in those initial days, E.W., et cetera. And that makes sense when you start thinking about it in that context that they thought this would be fast and quick and they didn’t need to use a whole lot of disruption or destruction in cyberspace or otherwise to achieve their objectives. And the other thing that I think is also becoming very clear is how few people in the Russian government and even the Russian military actually knew about this invasion. It turns out that the U.S. intelligence community and frankly, the rest of the world that has been paying attention to the warnings coming from the Biden administration knew much more about the invasion plans and what Russia was going to do than the Russian military. Much of the Russian military. The secrecy and the paranoia cannot be underestimated in terms of the impact that this had on the whole campaign that the Russians have waged here. The logistics problems that they’ve had, the communications problems and the cyber. So it wouldn’t surprise me in the least if they actually didn’t even tell the cyber guys that the invasion was going to take place until the very last minute when the orders went out because of the secrecy that Putin insisted upon, in part because I think he was very paranoid with all the disclosures that the U.S. intelligence community was making about his plans for false flag operations and so forth.

Thomas Rid:
Yeah, you’re making you’re raising a fascinating question there, obviously, about the coordination of different parts of the Russian security establishment or even just within the military establishment in terms of when to and what exactly would be launched on the 24th of February there. And by the way, before we, I just want to make a moderate comment. As the moderator, I just quickly zoomed, scrolled down and saw that there are so many extremely, I mean, so many friends, but also just extremely impressive individuals from this wider community in this space right now. So if you would like to come in and say something and you’re not speaker, I personally was occasionally invited to become a speaker when I was like, not ready because I was doing something that would have been inappropriate to speak it within while I was doing that. Like, you know, taking kids down and the if you want to speak, just hit a request. I won’t request you without you requesting first. But I would like to send a note that we’re an open, informal space here. Danny had your hand up.

Daniel Moore:
Yeah, I just wanted to add that I know we’re pretty thirsty community in the sense that we keep looking for something to instruct us on what cyber operations during conflict are supposed to look like. And now that we we haven’t seen it here. We’re sort of scrambling to redefine the space. So yes, there’s a lot to learn from here.But I also want to caution that this might not be the most representative of the potential of what we could be seeing, both at the outset of war time and during both on the strategic side and on the tactical side. There is certainly a lot of potential to target military networks and critical infrastructure and to facilitate early objectives through these means. And I agree with Dmitri that at a certain point, it becomes more tactical than strategic ones for deep into into wartime. But yeah, I would also caution not to overindex on what we’re seeing here is truly representative.

Thomas Rid:
I think this is a fundamentally important point to not jump to conclusions, to larger conclusions based on the state of the information that we currently have. I will just point out many of some of you here have discussed this already in privately with with with us today. But just a six about six hours or earlier today, the story broke that Viasat, the European network satellite internet service provider, was likely breached in preparation of of what looks like perhaps a command and control counter command and control operation, because apparently the Ukrainian military was a user of Viasat services, and the time of that breach was the time of the attack allegedly was 5:00 a.m. local time in Central Europe on the 24th. So that appears to have been some form of cooperation and coordination. Ben, you had your hand up and then one.

Ben Read:
Yeah, thanks. Exciting to be here. And like everybody speaking on behalf of myself and not necessarily my employer, but I want to both sort of support a lot of the sort of echoes of the Dimitrius said. In terms of that, not nothing seems to have been super well integrated in terms of the weather was sort of counter suppression of enemy air defenses or sort of other stuff. So it’s not entirely surprising that cyber doesn’t stand out there as kind of like having all of the heavy hitter sort of things moving in sync. So I think that’s an important point to remember when we’re when making a judgment that on sort of capabilities is that we haven’t seen them in general, but I do kind of want to also at the same time, speak to what we have seen because I do think it is not. It’s certainly not nothing. I mean, there have been three waves of at least three waves of wiper attacks against entities sort of in Ukraine and sort of along with them, dos website to basements. Again, not not the sort of like sexy stuff, but but still notable. And I do think that the impact of those is unknown. I mean, the Ukrainian government’s been able to get their message out primarily through Facebook and Twitter. And that’s a whole separate conversation.But we don’t have necessarily full insight into how much disruption actually happen from those. And at the same time, you’ve also seen sort of from Facebook’s blog post, a sort of disrupted operation trying to compromise Ukrainian service members Facebook accounts and post videos of Ukrainian soldiers surrendering from Ghostwriter. So there is a bunch going on and it is not super well planned out or super well integrated with the sort of full plan, but that kind of fits. Cyber doesn’t. There’s not sort of like as we kind of see and there’s not some kind of magical folks doing cyber who know everything and are omniscient. It kind of tracks with the rest of it. But I do think it’s important to remember that a number of things have happened and we don’t know. And obviously, that devices have stuff still out there as well. But but just about there and there has been things that happened in the certainly where we’re not over yet. And again, things are last thing. This is all there has been sort of continued and we’ll get to this later. But in terms of outside activity outside of Ukraine, there has been sort of a continued high tempo of sort of espionage operations trying to get perspective on what European capitals want to do and things like that.So there’s definitely a lot of Russian cyber going on.

Thomas Rid:
And Ben, when you say espionage operation, you mean in in a way that appears to be timed around the conflict or just your run of the mill regular activity.

Ben Read:
It’s been a consistent volume of it for the last six, 12 years or whatever, but certainly in the last couple of months, certainly significant operations against European ministers, foreign affairs, et cetera. But I mean nothing out of the normal, but it’s normally a high, high tempo there.

Thomas Rid:
Great. So thank you. Three. Hands up there’s John Scott Railton from the Citizen Lab, then Juan and Chris Krebs. John, let me jump in before before John does.

Juan Andres Guerrero-Saade (JAG-S) :
Just to piggyback on Ben’s point, there has been quite a bit of stuff going on. There are some different subsets that we would want to split up and, you know, at the risk of maybe nerding out a little too much on on the front of the, you know, threat intel stuff that we’re seeing. But you know, you’ve got stuff happening in Belarus that I think is quite interesting. I mean, Ben and Gabby have done amazing work on on Ghostwriter or I want to say eleven point fifty one, but I’m not good with your numbers. That in itself has been sort of fascinating and sort of watching this disinfo ops side of the house’s collection side of the house that the Russians seem to be involved in. And at the same time, seeing a bit of pushback on the part of the Russian and cyber partisans sort of affecting the train system a couple of times now and trying to kind of put up some kind of a front in Belarus on the part of the Russian groups that we’re seeing. I do think that it’s worth noting that it isn’t business as usual for Russian cyber.

Thomas Rid:
We’re not seeing Turlock and APT28 and Nobelium and these sort of sets that we’ve gotten used to and that we’re very familiar with to some extent, there is some level of preparation in that we are seeing entirely new components being dropped by groups that we have yet to be able to characterize. So to some extent, there was some level of preparation, but it’s more on the, you know, novel cyber side of the house of not having everything sort of defanged by the fact that we’re familiar with them. It’s just, you know, it’s not overwhelming and it’s novelty, but it is effective in what it’s been done. Yeah, great. Great point. Before John, just quickly, before John, you come in. I just wanted to quickly welcome many more listeners here in this room. We are growing fast. This is an event by the Alperovitch Institute at Johns Hopkins University. We are discussing where the cyber war in Ukraine and the war in Ukraine, where is whether the cutting edge cyber operations that we’ve seen so far? What may we see next? And what does it all mean for this bigger conversation? John Scott Railton from the Citizen Lab is next.

Ben Read:
Hi, everyone, it’s great to be here. What an amazing group of people to from my perspective, I feel like the Viasat thing is a bit of an indicator of what’s to come. If we look back at other conflicts where there have been large areas that are sort of like low internet connectivity where Russia is part of a war. I think that maybe this moves us towards the next steps conversation. There’s going to be a lot of focus on targeting the ways that Ukrainians are getting connected and staying connected, and then also trying to peek in and to sort of intelligence collection both broad stroke but also like tactical stuff of their activities. What’s interesting about the Viasat case is that I think early on people thought maybe this is some kind of satellite jamming, but it actually looks like update supply chain poisoning, which is really interesting. And it seems to have affected lots of terminals, lots of like user ground terminals in countries around Ukraine as well. Obviously, there’s no attribution at this point in. Viasat is like basically not saying anything publicly, but it’s an incredibly interesting situation. I’d also flag today. I’m sorry, Tom, did you

Thomas Rid:
Say actually, I just want to ask you, you may have seen the Spiegel covered the story with a really interesting piece. They, the German government seems to think, perhaps in contrast to what you just said. I’m curious how you make sense of that. They appear to think that some of the some of the outside Ukraine effects wind turbines, for example, were collateral effects.

Ben Read:
Yes, that seems that seems absolutely right. I’m sorry if it sounded like I was saying something different that this is all in fact collateral. And it’s it’s interesting because in general, like in the conflicts where there has been like jamming against satellites and in many cases, what jamming looks like is actually a ground station blasting something up at the satellite to make it hard for the satellite to do its communication business and find find signals on the ground. There’s collateral effect. So one sort of historic example now is that back in 2011, there were parts of Libya that were under opposition control and Gadhafi wanted to shut their connectivity down. A lot of them are using Syria. And so he did a fairly extensive jamming effort focused at the particular spot beam that was on Libya and wound up having collateral effects throughout the region. Here, this is something totally different. They seem to be focused on the update systems for these like KOB and satellites that Viasat uses and supplies terminals for in Ukraine. But in the end, it looks like they’ve had this collateral effect, too. So Germans and French and others are sort of like. Leaving their systems turned off in the hopes that by the time the update process, which takes a while, gets done. Whatever the update is, that’s that’s being poisoned has been removed.

Thomas Rid:
Yeah, fascinating for me. One of the fascinating questions of that case is whether we would have learned of the compromise relatively early, as we have without the collateral effects, because some of them may have prompted investigators to look more closely.

Ben Read:
Oh yeah. And just to build on that, I think there’s there’s talk. So today I want to say Elon Musk and Starlink is a conversation. We could have at some point said that there was some selected jamming of Starlink terminals or communications somehow in Ukraine, and I just don’t know what what he’s referring to yet. But as a general rule of thumb, if there is satellite communications jamming happening, it almost always is going to have collateral effects. And so you’ll likely hear about it from lots of places and so sporadic statements about satellite jamming unless it’s like something very close to the user in the terminal, you’re going to hear a lot about because it’s going to affect lots of different parts of like Sakata and critical infrastructure, which rely on those systems from fixed terminals.

Thomas Rid:
Fascinating. Chris Krebs, you had your hand up.

Chris Krebs:
Tom, thanks for having me on, and thanks for pulling us this spaces together. So I think a couple kind of observations off the off the top end. So there are a number of folks out there in the community that have been anticipating scenario development, war gaming. And Dimitri obviously has been at the forefront of saying, Hey, here’s what I think is going to happen. And this has been going on for several months anticipating this and perhaps in some. Some respects kind of like stretching the boundaries of what the establishment Actually thought, what was practical or possible, but nonetheless, when when the Russians went in a couple of weeks ago, it was like, Oh, well, you know, they were, they were they were kind of right all along. But but I feel like right now we’re we may be in a different space, right? I think a lot of the assumptions built in up front were that a the Russians were well coordinated and integrated. You’ve already talked about the Dmitri talked about that just just a few minutes ago. And so when we think about like, why haven’t we seen these things, I’m not sure that’s the right question, necessarily. It’s more about what did they try? Was it effective and how to align with their objectives? I think there’s a second question we have to start asking right about now. There’s a lot of the kind of the anticipatory questions and planning were more about thinking that the Russians were going to win this one and win it going away. And now we’re in a really interesting position where the Ukrainians are doing quite well. In fact, on the battlefield, they’re doing even better politically. A number of folks I see Renee dresses on, she had a great thread this morning about kind of what’s happening in the information ecosystem. And Tom Thomas, you’ve talked about this as well, but we anticipated a series of actions from the Russians. We’ve all talked about that we’ve prepared clients and and other folks. But I feel like the outcomes might be a little bit different now. And so we may be in a little bit different space in terms of what the Russians might do and how as the the economic sanctions or ratcheting up pressure on the domestic economy there may become economic necessity. So I think that’s the real challenge is kind of looking around the corner of what’s happening next, given we may be in completely brand new space and the mythology of the Russian cyber cyberattack capability may not be a what we thought it was or built, you know, put in a position to be successful. And we have a completely different set of political outcomes in front of us. And so that’s I think the real challenge here is how do we how do we anticipate, how do we talk about this in a responsible, reasonable way to make sure that we’re preparing, whether it’s again, you know, clients, government officials, the general public for what may be next?

Thomas Rid:
Absolutely. And you mentioned Rene Diretta and I just want to send a signal again out to anybody who’s listening. She’s obviously listening as well that you’re welcome to request speaker role if you feel like it. I don’t want to be too aggressive and request speakers without asking them first, but please do a request if you’d like to come in. And John had his hand up John Scott Railton.

Ben Read:
Just to totally put a giant highlighter through what Chris just said. I was looking back at a case study I wrote for the Libyan Civil War and remembering how in the first weeks there were so many periods where everyone thought they knew what the state of play was and then something big changed. Power went out, internet went out and everything changed. And I just I can’t stress enough that I’m sure that that Chris is right and that in a week we’re going to be having an entirely different conversation.

Thomas Rid:
Hmm. Rob, I think you wanted to come in and couldn’t find the hand up button.

Robert Lee:
Oh, that was a that was a general comment, but I will. Sorry, taking our signal chatting online? No, but look, it’s just not necessarily commenting on that. I think that the folks commenting on the fact that we may not be seeing all the things that are actually happening, I think that’s very fair. But again, we do know these groups are capable if we’re talking specifically on cyber. Not only are these groups capable, what we do know as a matter of fact that there are some of them that are currently developing offensive capabilities against things like industrial control system environments. It’s just it’s inherently escalatory. And so I think in Ukraine is a perfectly good bounding in the conversation. What happens next outside of Ukraine, especially in NATO and U.S. and allied countries? That’s that, to me, is the most interesting piece of this, but I know we’re probably going to have that conversation later, but there is a lot more happening than I think people are realizing. And if you’re going to impact infrastructure and if you’re going to have cyber operations like you don’t do that on the day of the conflict, you do that months ahead of the conflict. And so that’s where from a cyber perspective, I think a lot of the focus should be. Yeah, but let’s let’s that’s a great comment there. Let’s try to focus on that question. What could happen next? What may have already happened? We just don’t know about it yet.

Thomas Rid:
What’s the kind of computer network operation attack that we, we we should expect in a situation like this? And how would you assume escalation looks like? I think, Jade, you had your hand up and then one.

JD Work:
Hey, folks. Great to be here tonight with you all. I definitely did want to foot stomp much of the activities that will be seen in the current phases that perhaps have not been observed to date because of collection limitations or telemetry limitations, but also the things that will be used as this begins to escalate, particularly as the global reaction likely far exceeds the Kremlin’s pre-war calculus. They almost certainly did not anticipate what is effectively a developing economic blockade of the country on multiple levels. They’ve lost access to cloud services, they’ve lost access to aviation services, they’ve lost to the global financial system and a variety of critical ways. Initially, the warnings from a lot of folks were focused on this idea of symmetric retaliation. The initial I’m always skeptical of pure symmetry because the adversary sees things in very different ways. But as we begin to look at the manner in which they react next, it’s the things that are most critical to their survival. I mean, the seizure of aviation capabilities is incredibly important nationally. And if they can’t maintain engines, if they can’t maintain systems, they’re highly likely to drive espionage activity, but also potentially retaliatory activity to try to find a point in which countries are unwilling to continue further action. And insofar as many of the sanctions activities are actually a thing of private decision where private entities cannot accept that counterparty risk with firms and other entities operating in what is basically a revisionist regime that those companies are subject to pain points in a way that state policy is not. So I think we’re entering a period of incredibly heightened risk for a lot of private entities that are reacting not in considerably on their own accord in response to the general tenor and response to the uncertainty of the environment, but very much subject also to retaliation as a result of that. I’ll also say there’s a tremendous amount of pain points that are happening in these internecine developments. I mean, whatever credence you want to give to the reporting around the initial attempts at seizure of key Ukrainian government assets in on the twenty fourth. And the idea that there were perhaps competing mercenary groups and competing factional sponsorship. We know, for example, from other commercial reporting that there have been penetrations of different private sector, different private military companies operating out of Russia, potentially responding to different factional pressures. And the idea that this espionage was used to shape or effects, it used to shape how successful those missions were or were not even as the overall initial seizure campaign was failing. It’s just this fascinating dynamic that hasn’t really been surfaced. I think.

JD Work:
Thanks, JD, for your input there. Dmitri wanted to jump in, I think.

Dmitri Alperovitch:
Yeah, Thomas, I want to get back to what John brought up about satellites because I do think that’s a really interesting part of the conversation here. And that’s where we’re seeing a lot of things happening because we’re seeing some degraded communications on the Ukrainian side in Kiev and Kharkiv. Mobile service seems to be really sketchy. So a lot more people are relying on satellites and we have data on here who is one of the foremost experts on RF. And I know, Rob, you’re seeing some GPS jamming in Ukraine as well, which could potentially affect Starlink. Right? So maybe jump in here with your views.

Thomas Rid:
Yes. So I mean, there’s a lot of satellite communication protocols out there, which is probably one of the most ubiquitous ones that a lot of modern technology relies on. So GPS isn’t just used for positioning on the ground, which is something that is like a tactical advantage to knock out. But also, there’s a lot of timing synchronization that Gps is used for. So jamming GPS could actually be an attack on the telecommunication infrastructure because LTE base stations use GPS to essentially discipline their local oscillators and their clocks. So it might be more than just like a simple sort of like location in jamming that’s going on, and it could be a larger sort of like Attack against the Infrastructure, including telecommunications. And, for example, even ATMs use GPS timing to timestamp transactions. Excellent. When you say, Rob, if I may just follow up on Dimitri’s question, what kind of can you say a little more about the kind of GPS jamming that you, that you that we have observed that you may have observed? Yeah. So just recently, Hawkeye 360 published effectively some research on what they noticed. So Hawkeye 360 is a RF surveillance company that pretty much has satellites up in space so they can listen to things that occur on the ground, and they’ve noticed and picked up quite a bit of interference around the GPS L1 band. So pretty much there are jammers on the ground, probably close to the border of or like the former border of where the conflict was, where Russian troops might have actually wound up jamming GPS to to their advantage. So from the ground jamming GPS for other things that are on the ground, so pretty much swapping out the signal coming from the satellites.

Thomas Rid:
Hmm. So, so of of all the activity that we’ve seen so far. And let’s let’s think creatively about the kind of targeting activity that may come next. When does it get really interesting? What’s the most effective type of operation that we’ve seen so far? I’m curious what you would you say, whether anybody wants to jump in on this question?

Juan Andres Guerrero-Saade (JAG-S) :
Well, effective towards what I mean, and not to turn the question back against you, Thomas, But I think we are the title of even the space, I think speaks to some confused expectations that we seem to have regarding what the potential role of cyber could be in a conflict. And the conversation tends to go right back to something like not Petya, right? Where it’s the kind of attack that just cascaded everywhere had this amazing amount of spillover. It was incredibly costly. And I think folks expected something sort of breathtaking that way. And its absence seems to be what causes folks to think, you know, well, where is the great cyber war that we were expecting? I think to some extent. That expectation of sort of novelty and outsized effects is drowning out things like what Rob was just speaking about, where we see tactical wins or at least attempts at sort of tactical effects being undertaken in very specific settings. Including mediums like the Viasat modems that got bricked, I mean, I think you’re right, that had it not been something that spilled over into effects in Germany, we may not have heard about this at all. I mean, I had only heard about it in that context. And originally, of course, folks assumed, Oh, this is some kind of play at increasing energy dependence and whatnot. I think that gives the attackers way more credit in that in this particular case, I think they’re they’re they’re trying to get their tactical wins. And every once in a while, the interconnected nature of the internet just sort of slaps us in the face in ways that we hadn’t expected.

Thomas Rid:
Yeah, I mean, it’s also worth just pointing out what probably is obvious to most people here. And that is that the. Ukrainian armed forces are currently obviously in an existential war, so they are most likely not going to reveal that they have become the victim of a successful attack against their C2 infrastructure that they would probably trying to deal with it, but certainly not or perhaps not try to make that public for obvious reasons. So that, of course, is another reason why, you know why I think you’re right. One that we have very low visibility here. And of course, I think I mean, for sure, like many here, would agree that the expectations of the whole notion of cyber war are completely misguided in some context, and certainly here.

Dmitri Alperovitch:
Well, I want to plug your book, Thomas, that you wrote over 10 years ago that cyber war will not take place. And I think the events of the last 10 days have certainly proven your rights so far on that point. But I do want to sort of pivot the discussion a little bit towards what’s next. You know, I’ve been very public with a few predictions in the last couple of months. One of them was, of course, the invasion itself. But the other one was that in response to severe sanctions, which we’re now seeing quite unprecedented, not even the sanctions themselves, but just the complete disconnecting of Russia from the global economy through, in many cases, voluntary measures by Western companies to pull out to break contracts with Russia and so forth that the Russian was not going to take that lying down and it’s going to retaliate against the West, including in cyberspace. Of course, we have not yet seen anything significant in that front, but I do think that we’re in the sort of phony war stage of the conflict when it comes to Russia vis a vis the West and particularly the cyber retaliation. They’re obviously quite busy right now prosecuting a war in Ukraine. I don’t think that they’re interested in further escalating the fight and having a cyber tit for tat with the West until they get Ukraine more under control. But I think as soon as they start accomplishing their more military objectives on the ground in Ukraine, they may revert back to looking at the West. And how do we how do they target us and put pressure on us, including trying to split the Europeans from the alliance that we’ve established to confront Russia? I expect that there might be targeted. They might be targeting energy infrastructure in Europe. They might even target in the US as well. They might go after financial infrastructure, sort of as direct retaliation for sanctions, but curious what everyone else is thinking amongst this group of really August experts.

Thomas Rid:
Danny Moore had his hand up for a while and then Scott.

Daniel Moore:
So there’s a couple of things I would expect and we might not necessarily see them, but I think there’s the capability for them. One is there’s still a whole military tactical dimension that pairs nicely along with electronic warfare. I mean, if we think about the military equipment that’s in operation in Ukraine, a lot of it traces its roots to Russia or Russian technology. So there’s certainly the potential there for targeting. And they had enough time to do research and possession, although what would work on the tactical level. But aside from that, more on the strategic side, I expect we may see what I can only call operational abominations, essentially operations that try to achieve some kind of effect or create noise. And that could be either against just some set of organizations or even a infrastructure target. And then it wildly either overshoots or undershoot its intended objectives. That would be probably the most consistent piece of behaviour that I would see from these threat actors that are often technically highly complicated and successful, but then operationally incur some kind of failure at some point in their operational lifecycle. So the problem with this is that I’m actually less concerned about intentional targeting of foreign critical national infrastructure. But I certainly think that there’s a lot of potential for collateral as a result of the temple picking up and operations not having their intended effects. So I have a lot of concern for what this could mean for both Ukraine and targets out of Ukraine. And I actually think that the vice attack is a great example of this because there was no real operational need for them to infect or impact targets outside of Ukraine or at least Ukraine and its allies, especially if they controlled patching cycle where they could through command control, choose where they’re distributing their compromised patches. They either don’t care at the operational level or are incapable of executing this successfully. There’s a lot of previous evidence of this from former operations, whether that’s the Ukrainian energy grid or even Petya. And I’m concerned about what that means for the continuation of the conflict we had. Thank you, Rob, for this. We had who will fits in best one, Rob or John?

Dmitri Alperovitch:
I think we had Rob than John than one.

Robert Lee:
Right. Yeah. Just in terms of future activity, I think there’s and I appreciate Daniel talking about kind of the electrical system side of it. We were talking casually about this where if you impact GPS, I don’t think most normal folks would immediately understand the impact of an electric system. And you generally can’t run an electric system without the accurate timing of GPS. So there’s a lot of potential for collateral. But I do think people kind of get on either side of this of either cyber is useless and it’s never going to be impactful or, oh my God, somebody sent a phishing email to the power company. We’re all going to die. It’s like both extremes of that tend to be pretty ridiculous. But when you’re looking into U.S. and NATO aligned countries and we look at some of the targeting that we’ve seen on some of these companies, especially critical infrastructure, there are not truly many sites that are really fundamentally critical and everything critical infrastructure not being wrong. Everybody’s important, everyone’s unique snowflake. But you’re talking about very critical sites and we tend to be pretty fragile. And that’s where there are a couple sites. I can think of literally a handful that if you were to take down two or three of them, we can’t deploy troops in South China Sea or we can’t actually export fuel out of the country. There’s just very large focus on a couple of sites. And what we’ve seen is enough to be alarming, but without kind of getting to the extreme of it. What I’ll note is it’s unlikely we should expect to see attacks actually destroying infrastructure. Kind of what Dimitri was talking about the beginning and the grey zone discussion. We would expect to see cyber as a tool of shaping behavior and saying, Hey, please stay out of this conflict. So could we see a small term disruption as a signal of, hey, we could do more? I think that’s very realistic. Should we expect to see multiple portions of the electric system go down with key transmission and pieces of equipment getting destroyed and month long outages? No, no, of course not. Not outside of a true exchange of conflict. But those small time disruptions can have an oversized impact on the populace, and I’ll kind of sum it up here to say, you know, everyone freaks out about industrial attacks. And the reality is a lot of our infrastructure providers have put a large focus on stability, reliability, safety. And so of course, these attacks are possible and probably more so than people realize. But the idea that we’re all going to die off of an hour long power outage is ridiculous, but you could really scale that out with misinformation and similar to where a population of folks in any country could be very resistant to going further in any conflict, expecting that the art of the possible is now everything. Yeah. So, Rob, you made great comment, especially about the scaling out by using other tactics that are sort of adjacent to CND and seeing a narrowly defined and I just want to just want to briefly open our perspective.

Thomas Rid:
And just by observing that many of you will have seen the significant leak of names that the Ukrainian Pravda published of Russian mainly motorized rifle unit names tens of thousands, if not more than 100000 names of individual Russian soldiers with or personnel with full name, address, phone number or passport number date of birth. It was a pretty, pretty extraordinary leak. And of course, the leak highlights this question Where does it come from? Was it a hack and leak? Was it a seguinte collection and leak? Was it perhaps a leaker and then leaked? Meaning did somebody volunteer this information? And I say this to highlight that many cyber operations and there’s a long history of those may not appear as cyber operations because ultimately what we see of them is a leak. And leaks are obviously harder to attribute than actual breaches because they don’t provide the same types of artifacts and IOCs in forensics. But maybe this is a good moment to and I’ve seen one John and Jade with their hands up, but maybe this is a good moment to call on to bring in. Run Coney and also Lee Foster, who work in Derby works with ban on hunting, on investigating, if I’m not mistaken, mainly Russian operations and actors, and Lee has a unique perspective as somebody who is also covering the disinformation. I owe information operations side of the house. So to both of you, Gabby and Lee, what are you seeing that we haven’t touched based on yet? And what are you expecting? Maybe Gabby first?

Gabby Roncone:
Hey, yeah, so I think Ben covered when he spoke earlier, sort of what we’ve been seeing, but something I’d like to touch on is your is your question about sort of what we’re going to see next. And so going back to what we have been seeing right, we’ve been seeing the variety of different wipers, the dos and the defacement. And I don’t know if this is betraying the younger, but you know, like when I see Dustin defacement, I think that’s so 20 tons, right? Like these as as I think JAG said, are not novel tactics that they’re using in order to shape this environment right now. And so kind of where I am sort of struggling and I would sort of pose this question also to the group and people who are tuning in is like, what is the threshold for the high sophistication cyber attacks to be deployed? So if they do exist and I’m I’m sure that they do. I mean, even a couple of weeks ago, right, we saw I think it was. The U.K. and CSC post a blog on Cyclops Blink, which is San Worm’s newest BPM filter malware, which is again pretty, pretty novel and interesting. And obviously, even though that doesn’t or may not have a direct connection to this conflict, it’s sort of implies that those tools are available and ready to be used and have gone through the development cycles needed to be deployed at various points. And so given that the Russian forces are sort of wearing thin and the Ukrainian forces are doing great right now, at least according to the messaging that that I’m seeing, where do these elevated cyberattacks come into play? And I don’t I don’t really have an answer to that question because I think I personally would have expected these more high. Novel High Destructive Cyberattacks to be happening sort of now, but we haven’t seen that, so that’s sort of my take, and I definitely like to open up to the group if that sort of sparks any thoughts.

Thomas Rid:
Fantastic. Let’s let’s bring in Lee, the foster your former colleague to see what he’s thinking, what you’re thinking, Lee about the Io disinfo developments in this space. I know it’s extremely fast moving, very chaotic, very hard to attribute, obviously, and to understand what is done by whom. So this is a tough question that I’m throwing at you here.

Robert Lee:
Yeah. Thanks, Thomas. You kind of hit it at a strategic level, right on the head, right? To state the obvious, the information space right now around the conflict is a huge mess, and it’s going to take a long time to kind of untangle everything and get to attribution behind specific incidents. And that’s reflective, I think, just of the complexity of the the information environment. I mean, if you think about it simply from a kind of state actor standpoint, you’ve got, you know, Russia needs to kind of now justify its actions. Domestically, it’s cracking down on its kind of domestic information space, which perhaps it wasn’t anticipating needing to do so prior to the conflict. It’s trying to push messaging out to the Ukrainian populace, Ukrainian military to try and get them to not resist. And obviously, there’s a whole messaging dynamic targeting the rest of the world. And if we bring this around to the discussions of where does this go next, I can see attempts to try to weaken support for any united western or global response to the invasion. Similar to what we’ve seen in many other contexts, right? Trying to undermine kind of the domestic political environment within those countries, whether it be in the US or elsewhere in Europe and so on, to try and defend, disincentivize any kind of united front for that. We also know from prior to the invasion, the US government, European governments kind of announced this kind of Russian false flag plot to kind of justify an incursion. We now see, obviously that that wasn’t kind of required in order for Putin to make this this calculation. I think there’s an interesting research question there for somebody in terms of what was the knock-on effect of that early kind of exposure of that operation. But I don’t think the kind of motivation behind it is necessarily going away. Right. I think given the problems Russia is facing in the information space from this, I think that that need to kind of provide a justification remains. And so one thing I would anticipate here is to what extent does Russia try to use incidents on the ground, you know, kind of violence in Ukraine and repurpose kind of video So on incident reports to post fact justify the incursion. Yeah, that’s a fantastic point there. Also, the one thing that I just I’m just so stunned by and I think must be true for many in this space here is that the amount of creativity that we see on the iOS side, the memes and the artwork, even the creativity of what really looks like. A form of active measure, sometimes that is coming out of this conflict, and I’m phrasing it deliberately, vaguely because many of it doesn’t appear to be produced by any Ukrainian actor, but by supporters from the outside, and it’s just filtering into the conflict and shaping our views in ways that I think we’re not prepared to fully understand. I just caution that more broadly. Sorry. I was just going to say of caution that more broadly, right, there’s you know, there’s a lot of external actors that are kind of picking up on the on the developments in Ukraine to further their own particular narratives and so on. And that aligns with things we see kind of, you know, accusations from the QAnon community around how, you know, Russia is seeking to destroy US bioweapons labs in Ukraine. It’s an age old kind of narrative that’s spun out about Ukraine. But there’s no evidence of kind of Russia pushing that right. It’s coming from domestic groups elsewhere. Yeah. Great point. I still see hands up. But Olga Balog, lover, just joined as a speaker. We had to. This is a bit of a buggy app. It appears we had to first remove you as a speaker in order to be able to get you in. So Olga, did you want to come in on the disinfo? I o or something else?

JD Work:
Yes. Yeah, that’s exactly. You know, I think I wanted to talk a little bit about what I think has been really interesting here. A lot of us studying influence operations think a lot about the covert side of influence operations, deceptive manipulative campaigns, fake accounts, all types of things that we’ve seen before. But what’s interesting here in this particular conflict that we’ve seen both from the Russian and Ukrainian side, there’s a lot of overt influence. And I think that’s been sort of jarring for for those that are watching because they’re expecting something else. And and what they’re seeing sort of from the very, very beginning is the use of overt channels, including state controlled media outlets on the part of Russian threat actors and and in particular, using these channels to signal what exactly the Russian government is trying to do. And I think what’s interesting as well is a lot of us focus on foreign influence operations, but I think we we forget that a lot of what Russia is trying to do is signal to its own domestic audiences and in particular in this conflict to justify actions ahead of invasion. But also, you know, to continue to sort of delude people about what is actually happening on the ground. And I think in that particular piece, you know, watching what’s happening in terms of the closing of the information environment that’s continuing to happen over the last couple of days in Russia domestically is particularly concerning and including the closing and shutdown of certain, you know, the remaining independent media outlets like Echo Moskvy and Novaya Gazeta. You know, it’s really concerning because the Russian domestic population is increasingly becoming isolated in the information environment in this conflict, and so much of what the Russian government is interested in doing is targeting them, not us.

Thomas Rid:
Yeah, those are great points, and I just want to like add on a personal note, I’ve had a number of conversations with. Acquaintances and colleagues in Russia over the past few days, and it’s truly, truly on a personal level, it’s really heartbreaking what’s happening inside Russia? So many people fleeing the country and and of course, all eyes are on Ukraine first and foremost, for obvious reasons. But but the tragic tragedies that we’ve seen playing out on sort of personal and family levels in Russia, you know, shouldn’t be underestimated here. Just as on a human level, I felt it’s important to make that comment, John. And then.

Ben Read:
It’s interesting this point about what’s happening in Russia when I think back to the last couple of conflicts where Russia has done hacking, one of the things that is a perennial target is civil society, and that includes diaspora groups that are volunteering and bringing resources in, but also any of the homologues of the Ukrainian government working in NATO and U.S. governments are likely to be targeted. Some of that, surely, to create, hack and leak branded products. But I think after what we’ve seen in the last few days in Russia, just the number of people who are leaving as well and the changing roles of civil society there. I have to assume that we’re going to see a lot more targeting of organizations in the U.S. and in Europe that do work with Russian colleagues and with Russian civil societies. Similarly, a big thing that happened during the Syrian conflict was a lot of targeting of aid organizations and other people who are coordinating humanitarian aid and movement. And I think as we’re having these conversations about the bigger strategic things that are going on, it may be a while before we really understand the scope and scale of account compromises and malware operations that are targeting these different people spread out around the world in order to create things that Russia thinks may really in some sense, either for domestic or international audience, enable them to change the realities or the perceptions, but are that are going on? Certainly, we saw that thinking back to Syria about things like the use of chemical weapons, you know, they’re sort of red lines. Russia had been, you know, observing certain atrocities by the Assad regime and help them cover for it. And now that Russia itself may be responsible for some of those atrocities. I have to imagine something similar will happen here to.

Thomas Rid:
Hmm. Very sobering comment there, but of course, very plausible at the same time that we will see some more domestic targeting in Russia, which obviously there’s been a lot already over the past decade, as we’ve seen in some of the I remember just an anecdote that the famous bitterly leaked at GRU created because they forgot to set those accounts on private. That’s the one that had the Podesta link in there also contained a good amount of internal Russian political targets that were rather eyebrow raising, shall we say, to those who have seen the data.

Ben Read:
Yeah. And remember just to just to build on that, remember what we called the tainted leaks case that we investigated a good while ago, which was also discovered through a combination of things like shortness, where Russia actually was hacking civil society in the U.S. and U.K. and elsewhere in order to get material that they would then modify and manipulate for a domestic audience to try to diminish the credibility of Navalny by suggesting that he was getting foreign funding. So I think more of that surely to come.

Thomas Rid:
Yeah, yeah, yeah. Planting of evidence is next. I suspect JD. In that light, I would also say, particularly as the global de facto blockade begins to bite heavily in the elite, this is going to be incredibly important to sustain and control internal tensions develop. We’ve already spoken about the domestic political impacts of high casualties that are being reported, and we don’t know the truth on the ground of these casualty figures, but it certainly looks bad for the Russian forces previously in the 2014 period and associated years. There was extensive targeting of several of the opposition groups within Russia that were involved with soldiers, mothers type movements. These have been particularly prominent in the nineteen eighties and having a very unique cultural resonance that was considered a serious domestic internal opposition threat. That same level of targeting of international conflict monitors, including folks like Bellingcat, has been previously documented. Interestingly enough, this brings up the other line of to back to Gabby’s point on what are the exclusive capabilities that have been developed in-house by these very high tier teams? And then what are the capabilities being used for rapid capabilities, generation or prompt effects where the adversary knows they’re going to be burned and are using them effectively, deliberately de novo because they’re not being valued very highly or held in reserve? And the extent to which the leverage of criminal groups, as we’ve seen in the Conti leaks, for example, really is a sobering moment, not least of which because in the weeks leading up to the invasion itself, we saw a series of targeting which had, let’s say, strategically ambiguous dual use implications, the targeting of multiple ports, the targeting of oil and gas infrastructure by ransomware.

Thomas Rid:
Again, there’s a strong criminal motivation factor in many of those targets, but the potential to leverage those targets, particularly the ill advised statements about Conti that they apparently tried to walk back. But as we see the group’s factionalized, as we see these dynamics play out. We also saw targeting of a U.S. defense industrial base player that provides truck transport logistics to the NATO forward deployed presence, which is itself an interesting moment because it’s not a terribly profitable business to be hitting. Again, all the pre-war estimates suggest a red line was the provision of lethal aid and then direct involvement in the conflict. Well, we have extensive lethal aid being provided. To what extent that Red Line has already been crossed worries me. I just I just would like to comment. For the record, the record meaning also that this sadly event is not recorded because some of us messed up the settings on the back end. But the real challenge of moderating this event is actually the signal group of the speakers here, because that’s what the content is just flying past me because I can’t pay attention. The thing that I owe Gabby had her hand up. And also, I wanted to call on Ben Reid, who is one of our speakers but hasn’t spoken yet. So Gabby and then Ben, you are also a team.

Gabby Roncone:
Hey. Yeah, so I just wanted to sort of jump off that point. One of the really interesting things that I found about what we’ve seen so far with Ukraine targeting and that I think was briefly brought up before. I can’t remember by who, but one of the groups that that we’ve been tracking and we’ve been tracking them since I think January Twenty Twenty One is a group that we track is UNC. Twenty five to eighty nine. I know everyone loves the numbers and can remember all of them. Trust me, I can’t always remember the right numbers too. So it’s OK. But I’m twenty five. Eighty nine is a group that. And we mentioned this in our recent our recent blog on sort of what we expect for what we expect for Russian cyber activity with this conflict. I think it was written by Ryan Holland, James Sadowski from Mandiant, but they are a group that has co-opted criminal tools actually to do espionage sort of across the board, but also my again, super low confidence. But like be potentially related to some of the stuff that’s that’s been going on the destructive stuff in Ukraine. And so this is a this is a huge shift because, you know, we’re used to seeing the sand worms of the world right, doing their thing in the destructive realm, the temp isotopes. And in this case, we have this group that is using pretty easily detected criminal malware that they that they can get from wherever they want and end deploying that, at least in their early stages. And so again, like that’s that’s sort of all I the mystery about this group continues to to sound me, but their potential linkage with with destructive attacks makes them noteworthy. And again, going back to the sophistication level, they’re right. They might not be sand worm level and they might not be super sophisticated, but that doesn’t mean that they they won’t have any impact. And so, yeah, definitely a group to keep an eye on and a shift in Russian act tpz that I am personally very, very interested in.

Thomas Rid:
So I have. Thank you, Gabi. Ben, would you would you like to jump in as well?

Ben Read:
Sure. So, I mean, you get me some great analysis from her. The thing that I wanted to touch on and I had children waking up, so I had to drop off the apologies if I missed somebody else covering this. But the thing I wanted to touch on is sort of one of the things sort of my impression has been that. The Russian, like the ideal Russian scenario, is that the West kind of stays out of this. This is an internal problem. This is one people sort of that line. And so it’s just it’s none of the concern of sort of NATO or things like that. So that I think to me explains some of the Russian government doesn’t want them to get involved. So there’s not a reason to do too much sort of operational preparation of the environment or sort of like pre-positioning of stuff. Obviously, that’s been going on for a long time. The stuff Rob touched on, but the. But that but there’s there’s good explanations for why that there was not that much sort of of that prior previously or sort of teed up. And as we all know, those kind of spectacular operations take a while to set up. But as was mentioned by JD, sort of like, has that red line been crossed? And I think the U.S. is a obviously where I’m sitting, it’s where a lot of us are sitting, who aren’t up really, really late. But Europe is taking a very central role here in this and sort of rhetorically leading the way on a lot of this. So that’s really where I would be concerned because that is a place that has historically shrugged a little bit more in reaction to Russian aggression. So will that change be met with a similar kind of counter escalation?

Thomas Rid:
Yeah, fascinating point you’re raising there. I do think a lot of people in Europe have come around to basically become a lot more hawkish on Russia. But also the question that you’re raising is do they have the instant response, forensic investigation infrastructure in place in the private sector? You know, I’m excluding the U.K. here for a moment that actually would allow them to put, put there to actually deliver on those on there and actually detect what’s really going on and take action. Juan and than Dmitri, your hands up.

Juan Andres Guerrero-Saade (JAG-S) :
So I mean, there have been so many great points, and I think we’ve been kind of swerving in a lot of different directions, but something that I heard Jade bring up and I’m really glad Jade’s on the call. I think so many things have happened. Sorry, so many things have happened that it’s easy to get lost in what are just a series of absolutely amazing events that I hope we can all take good time to to appreciate and do a postmortem on when it isn’t such a horrible conflict that we’re sort of watching unfold day to day, but one that I really don’t want to just brush under the rug is this change of our insights into Conti and TrickBot? I mean, ransomware has been this horrible plague on us, everyone in the West over the past couple of years. And it’s, you know, it’s become a part of everyone’s, I mean, normal folks. People that don’t live by monitor light are very well aware of ransomware and concerned about it, and it has sort of become this strange justification for the cybersecurity industry. And looking at it in the context of Russian operations, there was always this plausible deniability. There was this notion of sort of this cutout, this relationship where we thought, Well, you know, to what extent is the Russian government involved? To what extent are they simply being allowed to operate without having any kind of concerns or difficulties from the government? Versus to what extent are they being coordinated by the Russian government? And with with the Conti leaks, we have this fantastic bit of insight into how Conti was being in some ways tasked at least partially tasked by the FSB or by the Russian government. And I’m just wondering if we can finally kind of cross the Rubicon of just looking at at least a couple of these ransomware groups and treating them entirely as part of these sort of official Russian forces? Can we can we essentially just take that bold step of no longer looking at them as somehow having a degree of separation from the Russian government?

Dmitri Alperovitch:
Well, I think I think that’s really complicated one, because you have members of this group says we’re now seeing who are from non-Russian countries, Russian speaking but non-Russian. So Ukrainian members most likely had an effect on splitting Conti and outing all their members and internal chat communications. And that’s probably true of many members. We know that their members from Kazakhstan, from Belarus and other places. So yes, individual members may be working, maybe even under control of certain members of the intelligence services, but I don’t think you can extend that to the whole group. And we can see now why. Let me just jump back for a second to the disinfo space because it really needs to be said very explicitly. The Ukrainians are just absolutely kicking Russians, but it’s not on the ground, but certainly in information warfare space the way that they’re able to leverage what they discover on the ground. It’s like cell phones of fallen soldiers or captured soldiers and then outing that very rapidly, sometimes within hours, both on social media and sometimes even in official channels like the famous speech by the Ukrainian ambassador to the U.N., where he read the text messages between a fallen soldier from Russia and his mother. And obviously, we have seen the in some cases, I’m not afraid to use the word propaganda that the Ukrainians are putting out about their successes on the battlefield, particularly this famous fighter pilot that’s nicknamed the ghost of Kiev that has single handedly at this point, I believe, has shot down twenty one Russian planes. If he keeps going, he’ll single handedly destroy the entire Russian Air Force. If you if you believe the Ukrainian figures here. But in response to that, you are actually seeing the Russians get really concerned. They are appreciating that they’re losing this information battle and as a result, you’re seeing them actually admit directly that they’re doing targeting of the Ukrainian information warfare units through artillery and airstrikes because they appreciate the damage that it is doing to them. From a morale perspective, because a lot of this information is certainly seeping through to Russia on Telegram channels and the like. And obviously globally as well. But I wanted to go back to John because John has incredible amount of information, having dealt with people like dissidents and journalists who have worked in challenging environments. We may very well have people from Ukraine joining us. Right now tonight in this chat on Twitter space. John, do you have any advice for people of how they should be thinking about secure comms if you’re on the ground in the zone of conflict right now?

John Scott Railton:
Yeah, don’t don’t trust your life to somebody tweet about OPSEC. You know, it’s it’s interesting. I was just as you were Dmitri making this this point about the information war and who’s winning. I saw like the first tweet published by Russia, the first video published by Russia that had footage of captured Ukrainian military vehicles. And I feel like Russia is almost certainly learning and watching what works for Ukraine and will mirror it in general for folks who are at very high risk. Given the nature of this risk, it’s like impossible to give good advice quickly and glibly. And so instead, what we usually encourage people is to get in touch with somebody who has expertise. If you’re in touch with an organization that has it, staff talk to them, have them reach out to somebody, et cetera, et cetera. What I remember from many conflicts before is there’s so much excitement in the early days, especially about like new exotic, untested technologies. Everybody who has like some app that they’ve been thinking about for secure messaging and suddenly saying, Man, we really need to push this into the conflict. And that’s almost always the wrong answer. And I look at this as something that may last for weeks and months, and people have to be around for a while. And for that to happen, they need advice systematically. So I can’t really give good advice that I that I’m confident with beyond the boring use two factor authentication on everything. And the one reason why that’s really relevant right now is we saw Mehta and others talking about Ghostwriter, focusing on taking over accounts of people in Ukraine and potentially using those accounts to push out disinformation. I think that particular threat is almost certainly going to continue and we’re going to see more like it. So account security is a big deal, but for the rest of it? Talk to an expert.

Thomas Rid:
Excellent question, Dimitri, on making this space helpful for people who would like to have to protect themselves and thanks John, for the response and that spirit and I do have Danny and Leigh on the list, but in that spirit, I would just like to throw up a question myself. And that is. That if this conflict, which at this stage is still a possibility to put it diplomatically, if this conflict ends up with a protracted or with a with an insurgency phase where you have a Ukrainian insurgency against some form of Russian occupation. Of course, we can’t speculate about how that may look like or not, but I think it’s not unlikely that this insurgency will be very special in the sense that it will be the first insurgency in the history of insurgencies. I know this is a big statement, but I think it’s true that certainly the first insurgency in the 21st century that will be supported by two intelligence or by multiple intelligence superpowers that the United States and other Five Eyes countries, especially the UK. That has never happened before. Because remember, the Five Eyes were busy being the insurgents for the past 20 years, and they’re now in a position to put some of the lessons that they learned trying to go after militants to work, helping militants to protect themselves and to succeed against another well-equipped intelligence establishment that I think is is uncharted terrain and really quite sobering, but also fascinating to think about what the possibilities are there. So what could how could an insurgency be supported remotely, so to speak? Not just remotely, but obviously also remotely through some of the tools that we’ve been we’ve been discussing tonight. That, I think is a fascinating question that, of course, we can only speculate about right now, but it’s a fascinating one. Let me get back to Danny and Lee Downing and Lee.

Daniel Moore:
So actually, my comment touches on what you’re asking because as much as we want cyber to matter and it does to some degree, I think we can all agree that the much more significant aspect here is the influence campaign waged on both sides, essentially the war over defining a compelling narrative. And this is one of those areas where it’s so surprising that Russia failed to show up. It’s embedded so deeply and for so long into their doctrine, and they invest quite a lot in trying to preemptively shape the political landscape that they want, in part to either shorten conflict or even avoid it altogether. And the fact that they were not able to do so well at the outset of the conflict here is huge. So as as this devolves potentially into insurgency and counterinsurgency, it’s. It’s going to be incredibly important that this insurgency projects an image of success, of hitting targets of exacting a toll of again shaping the narrative in a way that Russia has no chance of eking out a victory in a protracted conflict. So. And this is something that certainly Western intelligence agencies and the Ukrainians themselves can do a lot to help prop up, both by continuing to record all of these things and share them and providing them avenues to do so. Amplifying them wherever that’s possible and working to counter Russian narratives as well. And I think a lot of what we’ve seen the expenditure of Western intelligence assets simply to call out the bluffs on some of the Russian narratives is a good example of this, and I would like to see a continuation of those efforts. But in essence, as have been so far, so it shall continue to be that cyber is going to play second fiddle to the influence side.

Thomas Rid:
So very helpful comment, actually, especially from you. I will, I will add. Let’s bring in Lee. You had your hand up for a while and then I’d love to open get. I’m getting some direct messages from people in the audience. I’d love to open to a few audience questions as well. So but first, Lee?

Lee Foster:
Yeah, I think my my comment is actually a question kind of threads into what you, Danny and Dmitri just talked about Thomas at the beginning of the talk. You kind of highlighted this question about what does this all mean for the future of the cyber conflict? But I kind of extrapolate on that and talk about the info space in the way that the Donald just did. Dmitri pointed out the huge successes the Ukraine has had by the rapid release of information and so on. And I brought up earlier this evening kind of the Western intelligence community’s kind of early exposure of a planned Russian false flag to justify the incursion. And one thing I do wonder about is to what extent is what’s playing out here fundamentally change the nature of how kind of actors look at releasing information based on the perceived successes that there’s been in the conflict so far in terms of rapid release of information. But I believe that as kind of an open ended question for people to input on. Thank you, Lee. Before we open, Dmitri is doing a space tomorrow, so plug it.

Dmitri Alperovitch:
Yeah, thank you, Thomas. So same time tomorrow, eight o’clock, I’ll be doing a Twitter space focus on the military dimensions of this conflict with two military experts on Russia’s military, in particular Michael Kaufman and Rob Lee. Not not the probably the expert we have with us tonight, but the Rob League, the Russian military expert. Like me, they both have been convinced for the last three months or so that Russia was going to invade. Unfortunately, we were all proven wrong, and we’ll talk about how the campaign is going from the Russian perspective, how the Ukrainian defense is holding up and what we can expect next on the kinetic level to complement the cyber discussion. So thanks. Thanks for allowing me to plug in Thomas, of course.

Thomas Rid:
Pleasure and see. I see this space, by the way, should be absolutely fantastic. The people that Dmitry invited. I mean, I personally can’t wait to to listen in. Pyotr, you wanted to Pyotr ISIS alumni and you can introduce yourself. You wanted to say something. Yes.

Thank you very much, Thomas. Appreciate you inviting me up. It’s it’s great honor to be here. And Dmitry, I’ve listened to you a few times in Clubhouse, but Justin never came to me to ask you a question. So a pleasure to engage with you as well. No, I just. Cybersecurity isn’t my main area of international relations. I mainly look at great power politics and grand strategy, but obviously with the international relations element and the trans nationality of the way that things are going, I’m surprised by the lack of usage of the cyber security cyber attacks thus far from the Russians. I must admit. And given the growing connections that they have with China, I’m just curious if there were to be a potential campaign if we want to call it like that with China over Taiwan. What lessons could we take from this situation at the moment in terms of the build up that Russia has done, the usage of sort of Belarus and other pariah states to undertake sort of cybernetic attacks? How can we better prepare ourselves in the future for sort of these things and potentially maybe deter them because I think cyber security is something that lacks a coordinated central. Revised framework, the UN, for example, where I do most of my work is is very behind the times in terms of we don’t. There isn’t a framework in place to help combat against cyber attacks and these sorts of things. So just I know that’s a very sort of open ended question, but I’m just curious to have your your takes on that and how we can sort of work on this going forward because this is surely going to will galvanize other countries with their interests elsewhere. But thanks a lot. Thank you for this question. I think Ben Reed, you have your hand up.

Ben Read:
Sure. So there’s I’m neither China nor Russia expert, so I don’t want to get too far down the rabbit hole on the comparison. But one thing where I think it’s not worth drawing too much is that especially over the past five years or so, we’ve seen a much more centralized control over Chinese cyber capabilities where they’re they’re well coordinated. They have their talking points. They’re sort of they’re quitted both with each other and both with and with national goals. So I would because so much of this has been surprising in terms of the lack of coordination with cyber. I don’t think we should read too much into that being impossible. And especially given how closely China has centralized that command is and how well sort of political control it seems to be under. I think we would expect would expect really the opposite with them that they wouldn’t sort of do this. I mean, there’s leadership dynamics. There’s all kinds of complicating things, but I really don’t. I think this may be more sui generis genesis or power. If you say that in terms of the lack of use of cyber versus what you might see, especially from China.

Thomas Rid:
Umm, thank you, Ben. Let me just moderating on this app is actually not straightforward. And do we have another audience question, and we just see requests from one request just disappeared? Juan, you had your hand up as well. Uh, yeah, so perhaps on the tail end of Ben’s point, I do think that there’s there’s an element here that we should consider about the amount of preparation that did go into this on the cyber side of things. I mean, I think we’re we’re talking about this massive there have been no preparation and there was no activity where I think what we’re seeing is actually quite different, right? Whether if we can see the Viasat hack as a credible. Case and something that was done by the Russians, presumably that in itself would have taken some groundwork. It would have taken some preparation, the sets of wipers that we’re seeing this new tool kits that have been pulled out precisely for these operations in Ukraine involve a certain amount of preparation and a certain amount of coordination in that we’re not seeing them trip over other established Russian groups as far as we know.

Dmitri Alperovitch:
Yet although one, this could be something that was sitting on the shelf, particularly the VSV hack. It’s always useful to have updates. Can break satellite modems that you can just pull off the shelf when ready. Sure.

Juan Andres Guerrero-Saade (JAG-S) :
No, I’m sure. I’m sure to some extent that, you know, it’s not like they just invented everything for this in particular. But to some extent, there’s enough coordination, enough preparation in all of this to not watch, let’s say, a twenty eight get burned because one of these groups, one of these new groups that are involved in in Ukraine, decided to fake or mess up a wiper somewhere like there’s a certain amount of this that I think is in itself sort of noteworthy in that the TTP have changed. The techniques have changed precisely for this campaign and something that I want to at least, you know, I feel bad. I feel uncomfortable giving the Russians credit under, you know, any of the current circumstances. But there is something to be said about how these new wipers are built in, that they avoid having anything to do with self spreading mechanisms. They’re not. They’re not not. They’re not only not not Petya, they’re not like bad rabbit. They’re not in any way really being used in a way that’s supposed to sort of maximize access and have potential spillover. And I wonder to what extent that is kind of a lessons learned from not Petya or an attempt not to inflame sort of external actors or external targets and victims in all of this, or if we just got lucky. So excellent points, I would add another point that anybody who is, by the way, doing one of these spaces, I mean, just brace yourself for like a massive flow of information in terms of private messages.

Thomas Rid:
At the same time, it is is not easy. Great comment from Joe Cox. He is suggesting we should also mention the Joseph Cox should also mention the decentralised activity that that is happening. The anonymous declaring, quote unquote cyber war on Russia. And and of course, a similar similar observation that decentralized activities is sort of probably more significant than centralized activity is playing out on the on the inflow of information operations side of the of the game here. We’ve now been going for a little more than 90 minutes and I think it’s Saturday evening. Some people are getting tired. So I I think we should probably think about bringing this space to a close. And this is my first. I’ve been deeply impressed by the quality of the conversation, by the quality of the audience here, especially. So thank you for joining. And of course, thanks especially to all the speakers tonight that made this possible on a Saturday evening, really much appreciated. And I think let’s let’s do this again at some point. I like the informality of it all. Thank you for putting this together. It’s been pretty great. Thanks so much. Thanks. Thanks. I really appreciate this clubhouse. Thanks, Thomas. Appreciate it. Now, turns out you cannot talk at the same time. Ok, guys, take care, right? Thanks again, folks, talk to you all soon. Yes, indeed. And.

Sonix is the world’s most advanced automated transcription, translation, and subtitling platform. Fast, accurate, and affordable.

Automatically convert your mp4 files to text (txt file), Microsoft Word (docx file), and SubRip Subtitle (srt file) in minutes.

Sonix has many features that you’d love including transcribe multiple languages, collaboration tools, world-class support, share transcripts, and easily transcribe your Zoom meetings. Try Sonix for free today.

(function(s,o,n,i,x) {
if(s[n])return;s[n]=true;
var j=o.createElement(‘script’);j.type=’text/javascript’,j.async=true,j.src=i,o.head.appendChild(j);
var css=o.createElement(“link”);css.type=”text/css”,css.rel=”stylesheet”,css.href=x,o.head.appendChild(css)
})(window,document, “__sonix”,”https://sonix.ai/widget.js”,”https://sonix.ai/widget.css”);

Ukraine Crisis Resource Center
Get 90 days of SentinelOne Singularity access free of charge.

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies.

When you’re perhaps the most successful ransomware group around — Conti made $180 million last year in extortion payments, well more than any other crime group, according to Chainalysis — you tend to have a lot digital currency like Bitcoin.

This wealth allowed Conti to do things that regular investors couldn’t — such as moving the price of cryptocurrencies in one direction or the other. Or building a cryptocurrency platform and seeding it with loads of ill-gotten crypto from phantom investors.

One Conti top manager — aptly-named “Stern” because he incessantly needled Conti underlings to complete their assigned tasks — was obsessed with the idea of creating his own crypto scheme for cross-platform blockchain applications.

“I’m addicted right now, I’m interested in trading, defi, blockchain, new projects,” Stern told “Bloodrush” on Nov. 3, 2021. “Big companies have too many secrets that they hold on to, thinking that this is their main value, these patents and data.”

In a discussion thread that spanned many months in Conti’s internal chat room, Stern said the plan was to create their own crypto universe.

“Like Netherium, Polkadot and Binance smart chain, etc.,” Stern wrote. “Does anyone know more about this? Study the above systems, code, principles of work. To build our own, where it will already be possible to plug in NFT, DEFI, DEX and all the new trends that are and will be. For others to create their own coins, exchanges and projects on our system.”

It appears that Stern has been paying multiple developers to pursue the notion of building a peer-to-peer (P2P) based system for “smart contracts” — programs stored on a blockchain that run whenever predetermined conditions are met.

It’s unclear under what context the Conti gang was interested in smart contracts, but the idea of a ransomware group insisting on payments via smart contracts is not entirely new. In 2020, researchers from Athens University School of Information Sciences and Technology in Greece showed (PDF) how ransomware-as-a-service offerings might one day be executed through smart contracts.

Before that, Jeffrey Ladish, an information security consultant based in Oakland, Calif., penned a two-part analysis on why smart contracts will make ransomware more profitable.

“By using a smart contract, an operator can trustlessly sell their victims a decryption key for money,” Ladish wrote. “That is, a victim can send some money to a smart contract with a guarantee that they will either receive the decryption key to their data or get their money back. The victim does not have to trust the person who hacked their computer because they can verify that the smart contract will fairly handle the exchange.”

The Conti employee “Van” appears to have taken the lead on the P2P crypto platform, which he said was being developed using the Rust programming language.

“I am trying to make a p2p network in Rust,” Van told a co-worker “Demon” on Feb. 19, 2022. “I’m sorting it out and have already started writing code.”

“It’s cool you like Rust,” Demon replied. “I think it will help us with smart contracts.”

Stern apparently believed in his crypto dreams so much that he sponsored a $100,000 article writing contest on the Russian language cybercrime forum Exploit, asking interested applicants to put forth various ideas for crypto platforms. Such contests are an easy way to buy intellectual property for ongoing projects, and they’re also effective recruiting tools for cybercriminal organizations.

“Cryptocurrency article contest! [100.000$],” wrote mid-level Conti manager “Mango,” to boss Stern, copying the title of the post on the Exploit forum. “What the hell are you doing there…”

A few days later Mango reports to Stern that he has “prepared everything for both the social network and articles for crypto contests.”

DISTRIBUTED DENIAL OF DISCORD?

On June 6, 2021, Conti underling “Begemot” pitched Stern on a scheme to rip off a bunch of people mining virtual currencies, by launching distributed denial-of-service (DDoS) attacks against a cryptocurrency mining pool.

“We find young forks on exchanges (those that can be mined), analyze their infrastructure,” Begemot wrote.

Begemot continues:

“Where are the servers, nodes, capitalization, etc. Find a place where crypto holders communicate (discord, etc. ). Let’s find out the IP of the node. Most likely it will be IPv6. We start ddosing. We fly into the chat that we found earlier and write that there are problems, the crypt is not displayed, operations are not carried out (because the crypt depends on mining, there will really be problems ). Holders start to get nervous and withdraw the main balance. Crypto falls in price. We buy at a low price. We release ddos. Crypto grows again. We gain. Or a variant of a letter to the creators about the possibility of a ransom if they want the ddos ​​to end. From the main problem points, this is the implementation of Ipv6 DDoS.”

Stern replies that this is an excellent idea, and asks Begemet to explain how to identify the IP address of the target.

SQUID GAMES

It appears Conti was involved in “SQUID,” a new cryptocurrency which turned out to be a giant social media scam that netted the fraudsters millions of dollars. On Oct. 31, 2021, Conti member “Ghost” sent a message to his colleagues that a big “pump” moneymaking scheme would be kicking off in 24 hours. In crypto-based pump-and-dump scams, the conspirators use misleading information to inflate the price of a currency, after which they sell it at a profit.

“The big day has arrived,” Ghost wrote. “24 hours remaining until the biggest pump signal of all time! The target this time will be around 400% gains possibly even more. We will be targeting 100 million $ volume. With the bull market being in full effect and volumes being high, the odds of reaching 400% profit will be very high once again. We will do everything in our power to make sure we reach this target, if you have missed our previous big successful pumps, this is also the one you will not want to miss. A massive pump is about to begin in only 24 hours, be prepared.”

Ghost’s message doesn’t mention which crypto platform would be targeted by the scam. But the timing aligns with a pump-and-dump executed against the SQUID cryptocurrency (supposedly inspired by the popular South Korean Netflix series). SQUID was first offered to investors on Oct. 20, 2021.

The now-defunct website for the cryptocurrency scam SQUID.

As Gizmodo first reported on Nov. 1, 2021, just prior to the scam SQUID was trading at just one cent, but in less than a week its price had jumped to over $2,856.

Gizmodo referred to the scam as a “rug pull,” which happens when the promoter of a digital token draws in buyers, stops trading activity and makes off with the money raised from sales. SQUID’s developers made off with an estimated $3.38 million (£2.48m).

“The SQUID crypto coin was launched just last week and included plenty of red flags, including a three-week old website filled with bizarre spelling and grammatical errors,” Gizmodo’s Matt Novak wrote. “The website, hosted at SquidGame.cash, has disappeared, along with every other social media presence set up by the scammers.”

The Good, the Bad and the Ugly in Cybersecurity – Week 9

The Good

This week, it was announced that a joint effort between the French Border Police and the Spanish National Police, along with Europol, resulted in taking down an operation centered around counterfeit documents used, among other things, for human trafficking.

Forged identity documents are very big sellers on the Dark Web. Counterfeit documents available for purchase on the darknet include passports, birth certificates, drivers licenses, vehicle registration documents and other official identity cards.

While fake IDs can be used for a variety of nefarious purposes, the gang busted in this joint European law enforcement operation were said to be heavily involved in both human and drug trafficking, as well as property crimes. According to Europol, the organized crime group also charged upwards of €8000 per person for migrant smuggling operations.

Law enforcement agencies tracked distribution of forged ID documents across several jurisdictions, including France, Germany, Georgia, Italy, Lithuania, and Spain.

In the operation, seventeen suspects were arrested, six houses searched and a variety of electronic equipment seized. Police also recovered an unspecified amount of cash, as well as payment cards, counterfeit and genuine ID documents, and work permits. According to Europol, the gang’s network has been entirely dismantled and they have established multiple links between this case and other ongoing investigations.

The Bad

The Russian invasion of Ukraine has caused a significant rise in activity from Hacktivist groups, including website hacking and massive DDoS attacks aimed at Ukrainian entities. Researchers this week provided a fascinating look into one such threat actor and its connections across several countries, from Brazil to Sweden to Russia.

The self-styled “theMx0nday” group (The Monday Group) are based in Brazil and, the researchers claim, conduct operations in support of Russia. Most of their attacks are conducted through a Swedish ISP, Njalla, run by Pirate Bay co-founder, Peter Sunde, according to the researchers. They suggest that “theMx0nday” group may be using Njalla as a VPN exit node, although they haven’t ruled out the possibility that the attackers may have hacked another Njalla customer’s server or simply be Njalla customers themselves.

Aside from conducting massive DDoS campaigns against Ukrainian targets, the report says the Brazilian-based threat actor defaced multiple edu.ua (Ukrainian education) websites last week as Russia mounted its first incursions into Ukraine.

Prior to Russia’s military operation against Ukraine, the Monday group had primarily focused its attacks on Brazilian websites. Precisely what motivated it to support Russia’s invasion of Ukraine is at this time unknown, though it could be as simple as DDoS for hire. Since the story went viral, the group’s self-proclaimed “founder” deleted a tweet stating the hackers supported Russia’s invasion of Ukraine, claiming it was all for “the lulz”.

The Ugly

This week, a number of IoT vulnerabilities specific to healthcare have emerged, prompting CISA to release advisories in relation to two of them and researchers to call on healthcare providers to take medical device security more seriously in light of others.

Automated medication dispensing systems help clinicians to dispense medications to patients at the right time. Alas, it turns out that multiple products made by one vendor in use worldwide contain hard-coded credentials that can allow threat actors access to protected health information on the devices’ underlying file system. CISA reports that the vulnerabilities, CVE-2022-22766, CVE-2022-22765, have low-attack complexity.

While implementing hard-coded credentials in IoT or any internet-facing devices is fraught with dangers, credit goes to the device manufacturer who self-reported these issues upon discovery and is working to strengthen credential management in future devices. Meanwhile, mitigation steps can be found in CISAs advisories noted above.

In other health-related vulnerability news, researchers this week discovered that over 75% of 200,000 network-connected “smart” infusion pumps suffer from multiple vulnerabilities, previously reported and patched against various CVEs between 2016 and 2020. Infusion pumps and “Smart IV drips” serve to administer fluids and medication to patients through a controlled and programmable flow.

The vulnerabilities make it possible for attackers to gain access to sensitive information, but more worryingly in some cases unauthenticated users could send network traffic in a certain pattern that may cause the pump to become unresponsive or operate in unexpected ways.

Researchers have urged health providers to identify at-risk devices and to retire or repair them to avoid putting patients’ lives or sensitive information at risk.