Russian Cybersecurity Threats

Russian state-sponsored cyber actors are using compromised Ubiquiti EdgeRouters to facilitate malicious cyber operations worldwide, the FBI and other agencies warned Feb. 27.
In new guidance for software manufacturers, cybersecurity agencies in the U.S. and United Kingdom urge every software manufacturer to implement memory safe programming languages (MSLs) and publish a roadmap that details how they will eliminate MSL vulnerabilities in their products.
A Russian national Dec. 4 pleaded guilty to his role in developing and deploying a suite of malware tools known as Trickbot, used to launch ransomware attacks against American hospitals and other businesses, the Department of Justice announced.
The U.S. Treasury Department, in coordination with the United Kingdom, Sept. 7 sanctioned 11 individuals who are part of the Russia-based Trickbot cybercrime group, whose targets have included hospitals and other critical infrastructure organizations.
The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) Friday alerted the sector to the latest tactics used to launch MedusaLocker ransomware attacks.
Leading up to Russia’s unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable.
The FBI this week released a report detailing indicators of compromise associated with ransomware variants that have compromised at least 60 entities worldwide.
Why cybersecurity must be built into each hospital’s enterprise risk-management, governance and business-continuity framework.