23 years
97.9 Customer Satisfaction Score
200k Tickets Closed
83% resolved remotely
97% Resolved within SLA Goal

What Fort Lauderdale Business Owners Need To Know About Russia-Ukraine Cyber Warfare

Do you understand how battles are won and lost in the era of cyber warfare? Ilan Sredni recently met with CompTIA’s MJ Shoer to talk about how this new wave of cybercrime can affect businesses in South Florida.

Over the past few weeks, tensions have mounted at the Russia-Ukraine border as President Putin mobilized troops and made overtures of invasion.

While the real-world conflict has been minimal so far, on Feb. 15, Ukraine suffered a major cyberattack on its governmental and banking systems. This is just one of many attacks worldwide that are suspected of originating with Russian hacking groups.

“What users need to know is there’s almost no time for not being on a heightened alert anymore,” says MJ Shoer, CompTIA ISAO. “The fact of the matter is we can never let down our guard these days.”

Do you know what implications this has for the West and what lessons the Fort Lauderdale business community should learn from these incidents?

Check out this discussion between Ilan Sredni, Palindrome Consulting, and MJ Shoer, Executive Director, CompTIA ISAO to find out:

Russia Cyber Attacks Threaten Fort Lauderdale Businesses

“Now we’ve got nations at war,” says MJ. “We’ve always known that nation-states are conducting cyber-surveillance and cyber espionage, now we have a very clear and present danger associated with what’s taking place between Russia and Ukraine.”

This recent attack against Ukraine is a textbook example of cyberwarfare. Ukraine confirmed that the systems compromised in the attack are all critical ministry and banking targets:

  • Ministry of Defense website
  • Water distribution systems
  • Petroleum pipelines
  • Citizen banking systems

The attacks used Distributed Denial-of-Service attacks which flood the target website host with multiple data requests, resulting in lags and crashes. They also employed a form of malware similar to ransomware, but instead of encrypting the data, it simply deletes it.

The idea is that by causing chaos at the citizen level (disrupting their access to utilities and finances), Ukraine will be that much easier of a target if and when further military action is taken. A less organized enemy is less capable of defending itself.

This is a clear example of the threat that nation-state-affiliated hackers pose to the world. While they can often be involved in geopolitical conflicts between Russia and Ukraine, these cybercriminals also target businesses (like yours in Fort Lauderdale). That’s why you need to make sure you’re protecting your data.

“It’s only a matter of time until it reaches every country on the planet,” says MJ. “The United States has cause for concern because they’re leading the western response.”

Nation-State Attacks Have Been On The Rise For Years

Often originating in Asian and Middle Eastern countries, nation-state cyberattacks are unique in their danger because they are often executed with greater resources and near-total immunity from any sort of justice when compared to garden variety, US-based hacks.

For example, in mid-2019, Microsoft warned more than 10,000 users that their personal data may have been affected by nation-state attacks originating in Iran, North Korea and Russia. 84% of these attacks targeted businesses, and the remainder went after individual accounts.

Many respondents in a report by Radware noted anxiety in using newer networked devices and smart technologies that are not necessarily as secure as conventional onsite IT environments. Potential cybersecurity risks include:

  • The Cloud: A recent cloud security report shows that whereas two in five managers stated they relied on a hybrid environment made up of cloud and on-premise data centers, only one in ten felt confident in the security of their data in public clouds
  • Leading cloud vulnerabilities include unauthorized cloud access (42%), insecure interfaces (42%), misconfiguration of the cloud platform (40%), and account hijacking (39%).
  • Those responsible for cybersecurity have difficulty acquiring visibility into cloud infrastructure security and compliance (67%).
  • Outdated cybersecurity solutions don’t integrate with the cloud—66% of respondents said their traditional security solutions either don’t work at all, or only provide limited functionality in cloud environments

The bottom line is that if the cloud makes it easier for you and your staff to access your organization’s data, it can potentially make it easier for cybercriminals to do so as well.

The Internet Of Things

The respondents to Radware’s survey shared a range of concerns about the Internet Of Things (IoT):

  • Malware propagation (44%)
  • Lack of visibility (20%)
  • Denial of service (20%)

A popular new arena for technology, it’s estimated that there will be 64 billion IoT devices worldwide by 2025. IoT is a natural evolution of the Internet, consisting of a myriad of new “smart” and “connected” products and technologies for the commercial, consumer, and government environments.

As a so-far unregulated aspect of the IT world, IoT devices have been developed with minimal or nonexistent security features, despite the fact that they often connect over networks to sensitive data.

Should Fort Lauderdale Businesses & Citizens Be Worried About Russian Cyber Attacks?

While we don’t want to incite a panic, it is important to understand the likelihood of Russian-originated cyberattacks against the western world. It’s never been more important for everyone to remain vigilant, both as private citizens and as employees and owners in Fort Lauderdale.

For example, an attack could be similar to that of the Colonial Pipeline incident from last year. This ransomware attack resulted in a widespread shortage of gas across the country. The encryption of the petroleum supplier’s systems forced them to shut down operations for a number of days, highlighting the vulnerability of critical US infrastructure to cybercrime attacks.

However, this sort of infrastructural attack isn’t the only way that Russia could do damage to the US. They are just as likely to target citizens and lower-level employees at private businesses in Fort Lauderdale as well…

The Next Attack May Look Like A Fun App Or Harmless Facebook Quiz…

“If he were ever going to lash back, this could very well be a trigger point,” says MJ. “We have to assume the worst and hope for anything less than that.”

It’s important to keep in mind that not all attack vectors appear as an immediate threat. Often, cybercriminals will use a trendy app or a seemingly innocuous social media trend to gather valuable data on private citizens and key targets at private businesses.

For example, remember Faceapp?

In 2019, it was all the craze. This Russian-based photo-filtering app had seen a major surge in popularity thanks to its age-based filters.

Users were able to upload a selfie and have it automatically aged or de-aged to see what they would look like plus or minus a few decades. Posting wizened selfies on social media has become a viral fad among celebrities and everyday users, reaching well over 150 million users around the world that year

The key issue is that, in order to make these changes, Faceapp stores the image in the company’s own servers. The filters are not, as some would assume, applied on the user’s phone.

This is worrying, given that Faceapp is a Russian company. However, Faceapp CEO Yaroslav Goncharov told the Guardian that data is not transferred to Russia, but is actually stored in US-based data centers operated by Amazon and Google. Goncharov also told the Verge that photos are stored in Faceapp servers in order to save bandwidth when multiple filters are applied and that they get deleted not long after to free up server space.

Unfortunately, all of this was difficult to confirm. The uncertainty and potential for abuse of user data led to a lot of talk about privacy and data usage policies at the time, even by Senate Minority Leader Chuck Schumer.

Schumer requested that the FBI investigate Faceapp, saying, “In the age of facial recognition technology as both a surveillance and security use, it is essential that users have the information they need to ensure their personal and biometric data remains secure, including from hostile foreign governments.”

This is just one example of how nation-state hackers can trick targets into willingly giving up extremely valuable information or downloading dangerous malware. That’s why it’s so important for users to be able to recognize social engineering attacks.

“The next Wordle could very well be anything but safe,” says MJ.

What Fort Lauderdale Business Owners Need To Know About Social Engineering

Social engineering uses manipulation and deception to target a specific individual with the goal of getting them to give up sensitive information, or complete a task that benefits the hacker’s end goal.

Using email tactics similar to those used to spread ransomware, social engineering is the primary way that hackers influence unsuspecting users to do things they normally wouldn’t do. Phishing and Business Email Compromise (BEC) are the two major ways that social engineering is used to target victims.

Phishing is a fraudulent attempt to obtain sensitive information like login credentials or credit card numbers by impersonating trustworthy figures. BEC takes it one step further, targeting known users and prompting them to take action, like wiring money to bank accounts or buying gift cards and sending them to a hacker. In both cases, the cybercriminals exploit the naivety and ignorance of a person to get them to do something they might not normally do.

Spear phishing is an enhanced version of these exploitation methods. The hackers take the time to gather detailed information about the victims, targeting specific people and presenting them with detailed requests that only a knowledgeable person might have, causing the targeted people to lower their guard and leading to much better results.

How Can Fort Lauderdale Citizens & Business Users Defend Against Russian Social Engineering?

  • Watch For Overly Generic Content And Greetings: Cybercriminals will send a large batch of emails. Look for examples like “Dear valued customer.”
  • Examine The Entire From Email Address: The first part of the email address may be legitimate, but the last part might be off by a letter or may include a number in the usual domain.
  • Look For Urgency Or Demanding Actions: “You’ve won! Click here to redeem a prize,” or “We have your browser history pay now or we are telling your boss.”
  • Carefully Check All Links: Mouse over the link and see if the link’s destination matches where the email implies you will be taken.
  • Notice Misspellings, Incorrect Grammar, & Odd Phrasing: This might be a deliberate attempt to try and bypass spam filters.
  • Don’t Click On Attachments Right Away: Virus-containing attachments might have an intriguing message encouraging you to open them such as “Here is the Schedule I promised.”
  • Malicious Websites: It’s important to make sure you’re actually visiting the right website. Carefully check the URL, and make sure it begins with “https” (the “s” stands for secure).
  • Check App Permissions: Think carefully about what data you’re allowing an app to capture, store and transfer. Review the security permissions, and always err on the side of caution.
  • Careful What You Share Online: Think about the security questions you have protecting your email account—are the answers to them available on your public Facebook account? Make sure you don’t overshare online and make sure you choose security questions that only you have the answer to.

“You can’t be too careful,” says MJ.

Don’t Become A Casualty In The New Cyber War

For further news about the Russia-Ukraine cyber-conflict, and extensive resources to support your personal and professional cybersecurity efforts, visit CISA’s Russia Threat Overview & Advisories.

We would also urge you to consider joining CompTIA, which gives its members access to a vast range of valuable resources and tools in support of their cybersecurity.

If you need direct cybersecurity support, get in touch with the Palindrome Consulting team. We offer comprehensive cybersecurity services, including SOC, SIEM, and more, to help you adequately protect your Fort Lauderdale organization against modern cyber threats, including nation-state attacks.

Schedule your No-Obligation IT Assessment with Palindrome Consulting

Schedule Now

Elizabeth Mitrani
Elizabeth Mitrani
17:23 06 Aug 19
Palindrome Consulting was key in establishing my business and helps me keep it running. They are the consummate... professionals, incredibly knowledgeable and are always available to help. They have gone above and beyond to ensure that I was up and running quickly and that any issues that may arise on my end or dealt with immediately. I highly recommend Palindrome Consulting.read more
Moshe Rubinstein
Moshe Rubinstein
14:57 28 Jun 19
They are there every step of the way. Responsive and timely. The full service mentality mixed with the problem solving... abilities, is what makes them an easy choice.read more
Benjamin Wainberg
Benjamin Wainberg
14:09 28 Jun 19
Palindrome Consulting is customer centric. For Palindrome Data Safety is paramount; they keep their and our systems... updated with the newest technologies and are not shy at changing to better alternatives. Their platforms are always running and in the odd case there is an event, their technical team has an awesome response time.read more
Copier Man
Copier Man
13:56 28 Jun 19
We have been using Palindrome since 2005. They make my company feel like we are #1 all the time. Expert staff are... always available to help all my users all around the country.read more
Martin Feldman
Martin Feldman
16:43 26 Jun 19
As a partner in Fischer & Feldman, P.A. we have utilized Palindrome Consulting as our IT experts for many years. In... addition to keeping our server up and running, they are available to consult on the everchanging cloud and web landscape. We could not function as a successful law firm without their constant care, attention and almost IMMEDIATE RESPONSE TIME.read more
Rebecca Fischer
Rebecca Fischer
16:39 26 Jun 19
Palindrome has been my IT company for more than 15 years. We have been through four server and computer replacements... over the years all of which went smoothly. As technology has changed Palindrome has kept us current in their recommendations and are extremely responsive when we run into a software or hardware problem. We have been through hurricanes with Palindrome and felt confident they would have us up and running as quickly as possible and despite the fact we are probably a smaller client, they have treated us as one of their most important clients. I highly recommend Palindrome and have complete confidence in their capabilities and service. They have even gone the extra mile when we wanted to donate our old computers to a children's special needs school and delivered the computers, set them up and provided service for the same. Ilan Sredni is the consummate professional and has surrounded himself with top professionals and skilled technicians.read more
Nelson T
Nelson T
20:32 25 Jun 19
Palindrome Consulting has proven itself time and time again to be the epitome of professionalism and technical... expertise. They take the time to listen to your needs and then apply their wealth of technical knowledge to create truly innovative and robust solutions. They truly deliver piece of mind.read more
Next Reviews