The coordinated cyberattacks targeting Ukrainian government websites and the deployment of a data-wiper malware called WhisperGate on select government systems are part of a broader wave of malicious activities aimed at sabotaging critical infrastructure in the country.
The Secret Service of Ukraine on Monday confirmed that the two incidents are related, adding the breaches also exploited the recently disclosed Log4j vulnerabilities to gain access to some of the compromised systems.
“The attack used vulnerabilities in the site’s content management systems (October CMS) and Log4j, as well as compromised accounts of employees of the development company,” the SSU said, corroborating prior disclosure from the Ukraine CERT team.
” The attackers altered MBR records, which are the service information required for accessing the data on media. They did this on both individual server and user computers. This applies equally to Linux and Windows operating systems. “
The Ukrainian Cyber Police, for its part, noted that it’s investigating a combination of three intrusion vectors that were likely used to pull off the attacks — supply chain attack targeting an IT firm which manages websites for the Ukrainian government, exploitation of the flaw in October CMS, and Log4j vulnerabilities.
An additional fact, Kitsoft (the IT company mentioned by Microsoft) confirmed that it was infected with WhisperGate malware on Facebook. “The current situation is not just about hacking websites, it is an attack aimed at sowing panic and fear, destabilizing the country from within,” the company said.
While neither the Cyber Police nor the SSU attributed the defacements and the destructive malware attacks to any threat group or state-sponsored actor, the Ukrainian Ministry of Digital Transformation pointed fingers at Russia, accusing the country of trying to “wage a hybrid war. “