Cyberattacks Accompany Russian Military Assault on Ukraine

A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)
A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)
TT

Cyberattacks Accompany Russian Military Assault on Ukraine

A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)
A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)

The websites of Ukraine's defense, foreign and interior ministries were unreachable or painfully slow to load Thursday morning after a punishing wave of distributed-denial-of-service attacks as Russia struck at its neighbor, explosions shaking the capital of Kyiv and other major cities.

In addition to DDoS attacks on Wednesday, cybersecurity researchers said unidentified attackers had infected hundreds of computers with destructive malware, some in neighboring Latvia and Lithuania, said The Associated Press.

Asked if the denial-of-service attacks were continuing Thursday morning, senior Ukrainian cyber defense official Victor Zhora did not answer. “Are you serious?" he texted. "There are ballistic missiles here.”

"This is terrible. We need the world to stop it. Immediately,” Zhora said of the offensive that Russian President Vladimir Putin announced in the pre-dawn hours.

Officials have long expected cyber attacks to precede and accompany any Russian military incursion. The combination of DDoS attacks, which bombard websites with junk traffic to render them unreachable, and malware infections hewed to Russia's playbook of wedding cyber operations with real-world aggression.

ESET Research Labs said it detected a previously unseen piece of data-wiping malware Wednesday on “hundreds of machines in the country.” It was not clear how many networks were affected.

“With regards whether the malware was successful in its wiping capability, we assume that this indeed was the case and affected machines were wiped,” said ESET research chief Jean-Ian Boutin. He would not name the targets but said they were “large organizations.”

ESET was unable to say who was responsible.

Symantec Threat Intelligence detected three organizations hit by the wiper malware — Ukrainian government contractors in Latvia and Lithuania and a financial institution in Ukraine, said Vikram Thakur, its technical director. Both countries are NATO members.

“The attackers have gone after these targets without much caring for where they may be physically located,” he said.

All three had “close affiliation with the government of Ukraine,” said Thakur, saying Symantec believed the attacks were “highly targeted.” He said roughly 50 computers at the financial outfit were impacted, some with data wiped.

Asked about the wiper attack on Wednesday, Zhora had no comment.

Boutin said the malware’s timestamp indicated it was created in late December.

“Russia likely has been planning this for months, so it is hard to say how many organizations or agencies have been backdoored in preparation for these attacks,” said Chester Wisniewski, principal research scientist at the cybersecurity firm Sophos. He guessed the Kremlin intended with the malware to “send the message that they have compromised a significant amount of Ukrainian infrastructure and these are just little morsels to show how ubiquitous their penetration is.”

Word of the wiper follows a mid-January attack that Ukrainian officials blamed on Russia in which the defacement of some 70 government websites was used to mask intrusions into government networks in which at least two servers were damaged with wiper malware masquerading as ransomware.

Cyberattacks have been a key tool of Russian aggression in Ukraine since before 2014, when the Kremlin annexed Crimea and hackers tried to thwart elections. They were also used against Estonia in 2007 and Georgia in 2008. Their intent can be to sow panic, confuse and distract.

Distributed-denial-of-service attacks are among the least impactful because they don’t entail network intrusion. Such attacks barrage websites with junk traffic so they become unreachable.

The DDoS targets Wednesday included the defense and foreign ministries, the Council of Ministers and Privatbank, the country’s largest commercial bank. Many of the same sites were similarly knocked offline Feb. 13-14 in DDoS attacks that the US and UK governments quickly blamed on Russia’s GRU military intelligence agency
Wednesday’s DDoS attacks appeared less impactful than the earlier onslaught — with targeted sites soon reachable again — as emergency responders blunted them. Zhora’s office, Ukraine’s information protection agency, said responders switched to a different DDoS protection service provider.

Doug Madory, director of internet analysis at the network management firm Kentik Inc., recorded two attack waves each lasting more than an hour.
A spokesman for California-based Cloudflare, which provides services to some of the targeted sites, said Wednesday that DDoS attacks in Ukraine had been until then sporadic but on the rise in the past month but “relatively modest compared to large DDoS attacks we’ve handled in the past.”

The West blames Russia’s GRU for some of the most damaging cyberattacks on record, including a pair in 2015 and 2016 that briefly knocked out parts of Ukraine’s power grid and the NotPetya “wiper” virus of 2017, which caused more than $10 billion of damage globally by infecting companies that do business in Ukraine with malware seeded through a tax preparation software update.

The wiper malware detected in Ukraine this year has so far been manually activated, as opposed to a worm like NotPetya, which can spread out of control across borders.



USS Gerald R. Ford Aircraft Carrier Leaves Middle East

 The USS Gerald R. Ford in the waters of the Eastern Mediterranean, Oct. 11, 2023. (Jacob Mattingly/US Department of Defense/AFP)
The USS Gerald R. Ford in the waters of the Eastern Mediterranean, Oct. 11, 2023. (Jacob Mattingly/US Department of Defense/AFP)
TT

USS Gerald R. Ford Aircraft Carrier Leaves Middle East

 The USS Gerald R. Ford in the waters of the Eastern Mediterranean, Oct. 11, 2023. (Jacob Mattingly/US Department of Defense/AFP)
The USS Gerald R. Ford in the waters of the Eastern Mediterranean, Oct. 11, 2023. (Jacob Mattingly/US Department of Defense/AFP)

The USS Gerald R. Ford aircraft carrier has left the Middle East after taking part in operations against Iran, a US official said Friday, leaving two of the massive American warships in the region.

The Ford is currently in the US European Command area of responsibility, according to the official, who put the number of remaining US Navy ships in the Middle East at 20, including the USS Abraham Lincoln and USS George H.W. Bush aircraft carriers.

The Ford has been at sea for more than 10 months -- a deployment that has already seen it take part in US operations in the Caribbean, where Washington's forces have carried out strikes on alleged drug-smuggling boats, interdicted sanctioned tankers and seized Venezuelan leader Nicolas Maduro.

A fire broke out in a laundry room aboard the carrier on March 12, injuring two sailors and causing major damage to some 100 beds, according to the US military.

The carrier has also reportedly suffered significant problems with its toilet system while at sea, with US media reporting clogs and long lines for restrooms on the ship.

The United States and Iran are currently in an open-ended ceasefire, but the conflict remains unresolved, with Tehran blocking the vital Strait of Hormuz waterway and Washington's forces blockading Iranian ports.


US Treasury Warns Shippers Not to Pay Hormuz Tolls, Even in Form of Charity

 An Emirati patrol boat, left, is near a tanker anchored in the Gulf of Oman near the Strait of Hormuz, as seen from a coastal road near Khor Fakkan, United Arab Emirates, Friday, May 1, 2026. (AP)
An Emirati patrol boat, left, is near a tanker anchored in the Gulf of Oman near the Strait of Hormuz, as seen from a coastal road near Khor Fakkan, United Arab Emirates, Friday, May 1, 2026. (AP)
TT

US Treasury Warns Shippers Not to Pay Hormuz Tolls, Even in Form of Charity

 An Emirati patrol boat, left, is near a tanker anchored in the Gulf of Oman near the Strait of Hormuz, as seen from a coastal road near Khor Fakkan, United Arab Emirates, Friday, May 1, 2026. (AP)
An Emirati patrol boat, left, is near a tanker anchored in the Gulf of Oman near the Strait of Hormuz, as seen from a coastal road near Khor Fakkan, United Arab Emirates, Friday, May 1, 2026. (AP)

Any shippers paying tolls to Iran for passage through the Strait of Hormuz, including charitable donations to organizations such as the Iranian Red Crescent Society, are at risk of punitive sanctions, the US Treasury warned on Friday.

The Strait of Hormuz is one of the world’s most strategically vital maritime routes, with about 20% of the world’s ‌seaborne crude ‌oil and liquefied natural gas ‌flows passing ⁠through it.

Tehran has ⁠proposed fees or tolls on vessels passing through the Strait, as part of proposals to end the war with Israel and the United States.

The advisory, from Treasury's Office of Foreign Assets Control, said ⁠the US is aware of Iranian ‌threats to ‌shipping and demands for payments to receive safe passage ‌through the Strait.

The warning came as Iran ‌sent its latest proposal for negotiations with the US to Pakistani mediators, a move that could improve prospects for breaking an impasse in ‌efforts to end the Iran war.

OFAC said demands may include several ⁠payment ⁠options, including fiat currency, digital assets, offsets, informal swaps, or other in-kind payments, such as nominally charitable donations made to the Iranian Red Crescent Society, Bonyad Mostazafan, or Iranian embassy accounts.

"OFAC is issuing this alert to warn US and non-US persons about the sanctions risks of making these payments to, or soliciting guarantees from, the Iranian regime for safe passage," it said. "These risks exist regardless of payment method."


NATO and China: A Slow Alliance Confronts a Fast-Rising Rival

People visit the BYD booth at the Beijing Auto Show in Beijing on April 30, 2026. (Photo by Adek BERRY / AFP)
People visit the BYD booth at the Beijing Auto Show in Beijing on April 30, 2026. (Photo by Adek BERRY / AFP)
TT

NATO and China: A Slow Alliance Confronts a Fast-Rising Rival

People visit the BYD booth at the Beijing Auto Show in Beijing on April 30, 2026. (Photo by Adek BERRY / AFP)
People visit the BYD booth at the Beijing Auto Show in Beijing on April 30, 2026. (Photo by Adek BERRY / AFP)

NATO was established in 1949 to provide collective defense against the Soviet Union, based on the principle that an attack on one member is an attack on all. At the time, US President Harry Truman also sought to anchor an American presence in war-ravaged Europe to ensure security and prevent a strategic vacuum.

The collapse of the Soviet Union, along with the socialist bloc, brought the Cold War to an end and forced NATO to adapt. The alliance expanded its operations beyond Europe, intervening in the Balkans during the Bosnia and Kosovo wars, then in Afghanistan after the September 11, 2001 attacks in the United States. It also undertook maritime missions to combat piracy, including off the Horn of Africa, alongside intelligence-sharing and counterterrorism cooperation.

NATO has since built partnerships with countries beyond its traditional scope and broadened its definition of threats to include cybersecurity, hybrid warfare, and energy security, as well as, more recently, the challenge posed by China.

In sum, NATO has evolved from a purely European defensive alliance into a broader global security actor, largely driven by the United States, while still maintaining a central focus on deterring threats within Europe.

In recent years, the Brussels-based alliance has expanded its attention toward the Indo-Pacific region for strategic reasons that extend beyond Europe. Chief among these are the interconnected nature of global security, particularly in cyberspace, the need to ensure resilient and unobstructed supply chains, and the rapid spread of advanced technologies that increasingly diminish the importance of geographic boundaries.

FILED - 03 April 2025, Belgium, Brussels: A NATO flag flies in the wind in front of the NATO headquarters in Brussels. Photo: Anna Ross/dpa

China’s Rise

Another key factor is the view of China’s rise as a strategic challenge reshaping the global balance of power. For NATO’s 32 member states, up from 12 at its founding, safeguarding trade routes is a priority, especially maritime corridors in the Indo-Pacific that are critical to the global economy.

These include the Strait of Malacca between Malaysia and Indonesia, the world’s most important shipping lane, linking the Indian Ocean to the South China Sea and carrying roughly 25 percent of global trade annually. It is also a vital artery for oil and energy flows to major Asian economies such as China, Japan, and South Korea.

NATO member states express “strategic concern” over China for several core reasons. First, China is rapidly modernizing its military, particularly in areas such as missile systems, space capabilities, and cyber operations, developments that are shifting the global balance of power.

Second, and closely linked, is China’s economic rise, reflected in initiatives such as the Belt and Road, which provide Beijing with avenues to expand its economic and political influence across Asia, Africa, and Europe. This expansion risks creating dependencies among countries in or near NATO’s strategic periphery.

Concerns are also fueled by growing ties between China and Russia, particularly following Russia’s invasion of Ukraine in February 2022, which could signal coordination between two major powers against the West.

At the same time, an indirect competition is underway over leadership in fields such as artificial intelligence, telecommunications networks, and semiconductors. NATO sees technological superiority as a core component of security.

The alliance has concluded partnership and cooperation agreements with Japan, South Korea, Australia, and New Zealand, encompassing joint military exercises, intelligence sharing, and political coordination. However, NATO does not appear to be planning an expansion of membership into the Indo-Pacific, instead favoring flexible partnerships over a permanent military presence.