SlideShare a Scribd company logo
1 of 11
Cyber Security in Ukraine
A First-Hand Account
Major incidents: Petya-A/No-Petya
2
Major incidents: BlackEnergy 2015/2016
3
Major incidents: Financial institutions
4
Major incidents: Military conflict times
5
Major incidents: Maidan times
6
Ukraine cyber-security regulations
7
Ukraine cyber-security state entities
8
SWOT OF UKRAINIAN CYBER-SECURITY
9
Cooperation with NATO, EU, UK, US
EU Common
Security and
Defense
Policy (CSDP)
NATO Cyber
Defense Trust
Fund
UK Cyber
Security
Capacity
Building
Programme
US cyber-
security
assistance
10
Contact me: gpaharenko ([at]) gmail.com
WELCOME TO KYIV

More Related Content

More from Glib Pakharenko

Using digital cerificates
Using digital cerificatesUsing digital cerificates
Using digital cerificatesGlib Pakharenko
 
Automating networksecurityassessment
Automating networksecurityassessmentAutomating networksecurityassessment
Automating networksecurityassessmentGlib Pakharenko
 
социальные аспекты иб V3
социальные аспекты иб V3социальные аспекты иб V3
социальные аспекты иб V3Glib Pakharenko
 
Isaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ayIsaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ayGlib Pakharenko
 
Кому нужна защита персональных данных
Кому нужна защита персональных данныхКому нужна защита персональных данных
Кому нужна защита персональных данныхGlib Pakharenko
 
Copy of Кому нужна защита персональных данных censored edition
Copy of  Кому нужна защита персональных данных censored editionCopy of  Кому нужна защита персональных данных censored edition
Copy of Кому нужна защита персональных данных censored editionGlib Pakharenko
 
Кому нужна защита персональных данных censored edition
 Кому нужна защита персональных данных censored edition Кому нужна защита персональных данных censored edition
Кому нужна защита персональных данных censored editionGlib Pakharenko
 
Iso 27001 01_dmytriyev_kiev_2010_july_v2
Iso 27001 01_dmytriyev_kiev_2010_july_v2Iso 27001 01_dmytriyev_kiev_2010_july_v2
Iso 27001 01_dmytriyev_kiev_2010_july_v2Glib Pakharenko
 
Security certification overview v06 slides
Security certification overview v06 slidesSecurity certification overview v06 slides
Security certification overview v06 slidesGlib Pakharenko
 
Ukrainian information security group сидорова мария
Ukrainian information security group сидорова марияUkrainian information security group сидорова мария
Ukrainian information security group сидорова марияGlib Pakharenko
 

More from Glib Pakharenko (20)

Uisg5sponsorreport
Uisg5sponsorreportUisg5sponsorreport
Uisg5sponsorreport
 
Using digital cerificates
Using digital cerificatesUsing digital cerificates
Using digital cerificates
 
Abra pocket office
Abra pocket officeAbra pocket office
Abra pocket office
 
Utm
UtmUtm
Utm
 
Automating networksecurityassessment
Automating networksecurityassessmentAutomating networksecurityassessment
Automating networksecurityassessment
 
социальные аспекты иб V3
социальные аспекты иб V3социальные аспекты иб V3
социальные аспекты иб V3
 
Uisg opening
Uisg openingUisg opening
Uisg opening
 
Pentest requirements
Pentest requirementsPentest requirements
Pentest requirements
 
Kke
KkeKke
Kke
 
Isaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ayIsaca kyiv chapter_2010_survey_finding_summary_v07_ay
Isaca kyiv chapter_2010_survey_finding_summary_v07_ay
 
Uisg companies 4
Uisg companies 4Uisg companies 4
Uisg companies 4
 
Кому нужна защита персональных данных
Кому нужна защита персональных данныхКому нужна защита персональных данных
Кому нужна защита персональных данных
 
Copy of Кому нужна защита персональных данных censored edition
Copy of  Кому нужна защита персональных данных censored editionCopy of  Кому нужна защита персональных данных censored edition
Copy of Кому нужна защита персональных данных censored edition
 
Кому нужна защита персональных данных censored edition
 Кому нужна защита персональных данных censored edition Кому нужна защита персональных данных censored edition
Кому нужна защита персональных данных censored edition
 
Uisg cert
Uisg certUisg cert
Uisg cert
 
Uisg4sponsorreport 1
Uisg4sponsorreport 1Uisg4sponsorreport 1
Uisg4sponsorreport 1
 
Iso 27001 01_dmytriyev_kiev_2010_july_v2
Iso 27001 01_dmytriyev_kiev_2010_july_v2Iso 27001 01_dmytriyev_kiev_2010_july_v2
Iso 27001 01_dmytriyev_kiev_2010_july_v2
 
Statut ispau pd-gv2
Statut ispau pd-gv2Statut ispau pd-gv2
Statut ispau pd-gv2
 
Security certification overview v06 slides
Security certification overview v06 slidesSecurity certification overview v06 slides
Security certification overview v06 slides
 
Ukrainian information security group сидорова мария
Ukrainian information security group сидорова марияUkrainian information security group сидорова мария
Ukrainian information security group сидорова мария
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

State of cyber-security in Ukraine

Editor's Notes

  1. In a large amount of affected enterprises critical business processes were stopped for 1-2 days; Several weeks in many cases were required to fully recover oprations Losses are up to the 0.5% of country GDP The backdoor, which was used to compromise the tax reporting software users got the Pwnie award on the BlackHat conference The first attacks attempts started a month before the main attack. The tax reporting software vendor refused the backdoor existence. The WannaCry lessons were not studied, still many systems were not properly patched The tax reporting software service or its user account usually had all rights in the system, which facilitated the attack Companies which had its critical networks isolated got less damage Internet started from 1990 and the CERT team in 2007 and the world record in 2010 – 100 Gb/s DDos
  2. The power grids were stopped for several hours (which could lead to the humanitarian disaster due to the frost at winter) The incidents repeated in 2015 and 2016 in the same period of year The power grid management systems were not separated from the Internet The power supply was resumed only because of the "manual mode“ Power system operators thought that their PCs are operated by local "IT guys“ The PR services of the affected organizations worked inefficiently Attackers were active on the network for several months Attackers had private tools for attacks on industrial systems Perhaps there were several independent groups of attackers (representing different intelligence services)
  3. Losses reached millions of USD Attackers have studied systems and processes of institutions for many months InfoSec departments of the institutions first selected the wrong way of the internal fraud investigation Improper internal investigation activities led to the loss of digital evidence Timely manual monitoring of financial accounts allowed to identify further malicious activity The attackers known well payment systems and ATM protocols
  4. Multi-weeks denial of service (DoS) attacks on websites Attackers constantly changed tactics Websites were not ready to defend against attacks Personal accounts of mail and social networks were under the attack Also the targets were mobile phones In the center of Kiev, demonstrators seized the room used for power systems management
  5. Main regulations The cyber-security strategy, approved by the President1 in 2016 The cyber-security strategy implementation plans approved by the Cabinet of Ministers 2,3 The sanctions list, which bans Russian IT companies and social networks4 The President decree on the national cyber security center5 The National Security Council decisions on the urgent cyber-security measures 6,7 The National Law on Cybersecurity8 Some other important regulations: Law on personal data protection EU cyber-crime convention National technical standards on information security and cryptography 1http://www.president.gov.ua/documents/962016-19836 2http://zakon2.rada.gov.ua/laws/show/440-2016-%D1%80 3http://zakon2.rada.gov.ua/laws/show/155-2017-%D1%80#n13 4http://www.president.gov.ua/documents/1332017-21850 5http://www.president.gov.ua/documents/2422016-20141 6http://zakon2.rada.gov.ua/laws/show/n0015525-16/paran2#n2 7http://www.rnbo.gov.ua/documents/447.html 7http://zakon3.rada.gov.ua/laws/show/2163-19
  6. Main entities The Information Security Authority1 and its CERT team2 The Security Service of Ukraine and its cyber-security situational centers3 The Cybercrime police unit4 The State Concern Ukroboronprom (Ukrainian Defence Industry) cybersecurity center5 The Military center of information and cyber security6 The National coordination center on cyber-security (governed by the National Security Council) The National Bank of Ukraine (only for financial institutions) 1http://dsszzi.gov.ua 2http://cert.gov.ua 3https://ssu.gov.ua/ua/news/1/category/2/view/3668#.i42HGqpp.dpbs 4http://cybercrime.gov.ua 5http://cyberguard.com.ua 6http://www.mil.gov.ua/ukbs/pravila-informaczijnoi-ta-kibernetichnoi-bezpeki-v-zoni-provedennya-ato.html
  7. The actors of the major incidents were not properly identified and prosecuted No proper prediction of major incidents Ukraine authorities are not capable by themselves to investigate complex malware or SCADA malware The national cyber-security system is still immature, national cyber-security standards about 20 years old or even refer to the USSR standards The high corruption level does not allow effective investments into the national cyber-security Personal data has very weak means of protection in the state databases E-government systems and IT controls either do not work or efficiently being bypassed by public servants Insufficient salaries for cyber-security professionals in the state agencies (up to several hundreds USD per month) State information security authority has a conflict of interest as it puts the rules and checks the compliance against them Development of national security capabilities: State demand for the word-class security products and services Educational programs to create generation of “reverse-engineering” and cyber-security experts Highest requirements for cyber-security specialists in the state agencies and cyber-security national actors Creation of national security tools and research centers (e.g. SCADA systems labs, etc.) National cryptography development National cyber-security audit strategy for critical infrastructure assets Effective IT governance at the state agencies Culture and ethics level improvements at the state agencies Proper cyber-risk management and responsibility for failures of state agencies officials Overall improvement of state agencies efficiency and their continuous audit and monitoring Independence of critical infrastructure cyber-security from the centralized information security authority Improved security of the supplied chain for IT goods and services The lack of skilled persons or even persons who knows English well at cyber-security positions at state agencies and national cyber-security actors The hardware and software security verification is at the lowest level The lack of responsibility for cyber-security failures, the lack of “due care” and “due diligence” from agency heads High dependency of the IT supply chain from one neighbor country Majority of the Internet traffic is still routed through the one neighbor country There is no civil society control and sufficient limits on the lawful interception activities Corrupted officials from the law enforcement agencies often practice seizure of all IT equipment in companies and require bribes to return it back Clean national internet segment from infected and misconfigured devices, which facilitate cyber-attacks Remove cracked/pirated software from the public systems Implement continuity standards for media and telecoms for the hybrid-war affected locations Implement effective filtering mechanisms on the national Internet traffic exchange points Ensure availability of the redundant internet routes through all the country Improve digital evidence and threat indicators sharing capabilities Implement effective civil society controls over unauthorised interception and collection of data Provide resources for military and security services to effectively conduct forensics and memory acquisition of IT devices in the conflict zones
  8. Support from donors: Participation in the EU Common Security and Defense Policy (CSDP) NATO Cyber Defense Trust Fund Participation in the UK Cyber Security Capacity Building Programme US cyber-security assistance Involvement of Ukraine in the UK, EU, US, NATO projects: Procurement of cyber-security services and goods in Ukraine Support for Ukraine domination in the Russian speaking Internet media segment Outsourcing of cyber-security operations to Ukraine Joint research programs with Ukrainian institutions. Potential areas are: Nuclear plants cyber-security Military cyber-security Cryptography (Ukraine has a strong crypto and math school inherited from the USSR)