Keepnet Labs Logo
Menu
HOME > blog > the conflict between russia and ukraine is getting worse

Cyber Conflict Update: Telegram's Role in Escalating Cyberattacks in the Russia-Ukraine War

Amid the Russia-Ukraine conflict, cyberattacks against Ukraine are spiking by nearly 200%, with hackers turning to Telegram to organize and communicate. Explore the impact of these attacks and cybersecurity strategies to stay protected.

The Conflict Between Russia and Ukraine Is Getting Worse

Cyber Conflict: How Telegram Powers Hackers Amid Rising Attacks in the Russia-Ukraine War

The ongoing Russia-Ukraine conflict has escalated into a digital battlefield. Cyberattacks against Ukraine increased by a staggering 196% in the last three days, according to Check Point research, while attacks against Russia rose by a modest 4%. Amid this digital war, hackers leverage Telegram, an encrypted messaging platform, as a digital stronghold for organizing attacks, sharing tactics, and rallying support for Ukraine

The Role of Telegram in the Cyber War

Telegram has become a hotbed of activity, with its encrypted messaging and minimal censorship providing a perfect environment for hacktivists. For political activists and hackers, Telegram offers a safe space to mobilize, coordinate, and even fundraise, away from the prying eyes of authorities or censorship that might hinder their efforts. Researchers have documented a sixfold increase in political and hacker group activity on Telegram since the start of the conflict in February 2022, with daily creation of new chat groups focused on cyberattacks.

Why Telegram?

As a platform, Telegram is favored by these groups for several reasons:

  • Encryption and Privacy: Telegram’s privacy features shield hackers and activists from government surveillance and censorship.
  • Open-Source Features: With Telegram’s open-source nature, groups can create specialized tools for coordination and quickly build new channels for sharing sensitive information.
  • High User Engagement: Some of these groups have amassed audiences exceeding 250,000 users, allowing for efficient dissemination of plans, news, and even fake updates.

For hackers and cybercriminals, Telegram combines functionality and anonymity, making it ideal for real-time coordination and fast response to changing situations in the field.

Types of Hacker Groups Using Telegram

Researchers have identified several types of groups utilizing Telegram for cyber activities related to the Russia-Ukraine war:

  1. Political Hacktivist Groups: These groups use Telegram to promote anti-Russian messages and to rally support for Ukraine. They might distribute DDoS attack techniques or organize raids against specific Russian websites and institutions.
  2. Coordination and Support Groups: These groups help individuals organize cyberattacks and share resources. When a particular website or server requires a takedown, one group might call on others for assistance, pooling resources to amplify their attack power.
  3. Crowdfunding and Resource Sharing: Some groups use Telegram to solicit donations for pro-Ukraine causes. Members contribute funds to finance cyber weapons, bolster Ukrainian defense infrastructure, or support Ukrainian civilians directly.

These groups also share attack results, often bragging about disabling or compromising Russian websites, thus serving as both encouragement and motivation for members and supporters.

The tactics used by these groups are as diverse as the individuals participating:

  • DDoS Attacks: Distributed Denial-of-Service attacks have surged, targeting Russian government sites, news organizations, and commercial platforms. By overwhelming servers with traffic, hackers aim to disrupt Russian communication and propaganda efforts.
  • Fake News and Disinformation: Telegram groups spread fake news to mislead users, disrupt morale, or provoke anger. They share crafted, often manipulated stories, designed to align with their agenda and sway public opinion.
  • Phishing and Social Engineering: Hackers within these groups share techniques and resources for phishing attacks, hoping to gain unauthorized access to Russian information and military databases.

Impact on Cybersecurity for Businesses and Individuals

With the escalation of cyber warfare, businesses and individuals in Ukraine and neighboring regions are increasingly at risk of collateral damage. Cyberattacks are unpredictable and often spread beyond their original targets. Russian and Ukrainian citizens, along with companies that have business ties in either country, are highly vulnerable to this spillover effect.

Security Tips for Avoiding Cyber Risks

The following cybersecurity strategies can help mitigate risks associated with these attacks:

  1. Verify Links Before Clicking: Avoid clicking on unverified or unfamiliar links, as they may lead to phishing pages or malware.
  2. Be Wary of Suspicious Requests: Treat all unexpected requests for information, funds, or help with caution, especially if they lack credible verification.
  3. Fact-Check Information: With the high potential for disinformation, double-check sources before sharing or acting on any news.
  4. Check Time Stamps and Sources: Misinformation and fake news often lack credible timestamps and sources. Verify the legitimacy of information and always check back to the original source.
  5. Use Reputable News Sources: Stick to trusted, verified news outlets for updates on the conflict. Fake news and propaganda can spread quickly, particularly on social media platforms.

By implementing these measures, individuals and organizations can minimize their vulnerability to the fallout of this digital war.

How Companies Can Prepare

For businesses, especially those with ties to Ukraine, Russia, or nearby areas, heightened security measures are critical. Here are ways companies can strengthen their defenses:

  • Invest in Employee Awareness Training: Educate employees on identifying phishing emails, suspicious requests, and potential social engineering attacks. Security Awareness Training can empower employees to act as a first line of defense.
  • Deploy Phishing Simulators: Tools like Phishing Simulator can simulate real-world phishing attacks, helping employees recognize threats before they cause harm.
  • Stay Updated on Threat Intelligence: Regular threat intelligence monitoring helps companies stay aware of current threats and emerging tactics. The Keepnet Human Risk Management Platform is a valuable resource for companies looking to stay ahead of cyber risks.

Conclusion

As the Russia-Ukraine conflict rages on, the cyber battle has become just as fierce, with Telegram as a central hub for hackers and hacktivists coordinating their digital warfare. As cyberattacks increase and the potential for collateral damage grows, businesses and individuals alike need to be vigilant. By following best practices in cybersecurity, verifying sources, and understanding the risks, individuals and organizations can protect themselves amid this complex and shifting digital landscape.

Editor’s note: This blog was updated November 7, 2024

SHARE ON

twitter
linkedin
facebook

Schedule your 30-minute demo now

You'll learn how to:
tickUse real-world simulations to prepare your team for evolving cyber threats.
tick Implement phishing prevention training to mitigate risks from unexpected attacks.
tickLeverage threat intelligence to keep your business informed and resilient.