Cyberattacks Accompany Russian Military Assault on Ukraine

A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)
A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)
TT

Cyberattacks Accompany Russian Military Assault on Ukraine

A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)
A Ukrainian soldier talks with her comrades sitting in a shelter at the line of separation between Ukraine-held territory and rebel-held territory near Svitlodarsk, eastern Ukraine, Wednesday, Feb. 23, 2022. (AP Photo/Evgeniy Maloletka)

The websites of Ukraine's defense, foreign and interior ministries were unreachable or painfully slow to load Thursday morning after a punishing wave of distributed-denial-of-service attacks as Russia struck at its neighbor, explosions shaking the capital of Kyiv and other major cities.

In addition to DDoS attacks on Wednesday, cybersecurity researchers said unidentified attackers had infected hundreds of computers with destructive malware, some in neighboring Latvia and Lithuania, said The Associated Press.

Asked if the denial-of-service attacks were continuing Thursday morning, senior Ukrainian cyber defense official Victor Zhora did not answer. “Are you serious?" he texted. "There are ballistic missiles here.”

"This is terrible. We need the world to stop it. Immediately,” Zhora said of the offensive that Russian President Vladimir Putin announced in the pre-dawn hours.

Officials have long expected cyber attacks to precede and accompany any Russian military incursion. The combination of DDoS attacks, which bombard websites with junk traffic to render them unreachable, and malware infections hewed to Russia's playbook of wedding cyber operations with real-world aggression.

ESET Research Labs said it detected a previously unseen piece of data-wiping malware Wednesday on “hundreds of machines in the country.” It was not clear how many networks were affected.

“With regards whether the malware was successful in its wiping capability, we assume that this indeed was the case and affected machines were wiped,” said ESET research chief Jean-Ian Boutin. He would not name the targets but said they were “large organizations.”

ESET was unable to say who was responsible.

Symantec Threat Intelligence detected three organizations hit by the wiper malware — Ukrainian government contractors in Latvia and Lithuania and a financial institution in Ukraine, said Vikram Thakur, its technical director. Both countries are NATO members.

“The attackers have gone after these targets without much caring for where they may be physically located,” he said.

All three had “close affiliation with the government of Ukraine,” said Thakur, saying Symantec believed the attacks were “highly targeted.” He said roughly 50 computers at the financial outfit were impacted, some with data wiped.

Asked about the wiper attack on Wednesday, Zhora had no comment.

Boutin said the malware’s timestamp indicated it was created in late December.

“Russia likely has been planning this for months, so it is hard to say how many organizations or agencies have been backdoored in preparation for these attacks,” said Chester Wisniewski, principal research scientist at the cybersecurity firm Sophos. He guessed the Kremlin intended with the malware to “send the message that they have compromised a significant amount of Ukrainian infrastructure and these are just little morsels to show how ubiquitous their penetration is.”

Word of the wiper follows a mid-January attack that Ukrainian officials blamed on Russia in which the defacement of some 70 government websites was used to mask intrusions into government networks in which at least two servers were damaged with wiper malware masquerading as ransomware.

Cyberattacks have been a key tool of Russian aggression in Ukraine since before 2014, when the Kremlin annexed Crimea and hackers tried to thwart elections. They were also used against Estonia in 2007 and Georgia in 2008. Their intent can be to sow panic, confuse and distract.

Distributed-denial-of-service attacks are among the least impactful because they don’t entail network intrusion. Such attacks barrage websites with junk traffic so they become unreachable.

The DDoS targets Wednesday included the defense and foreign ministries, the Council of Ministers and Privatbank, the country’s largest commercial bank. Many of the same sites were similarly knocked offline Feb. 13-14 in DDoS attacks that the US and UK governments quickly blamed on Russia’s GRU military intelligence agency
Wednesday’s DDoS attacks appeared less impactful than the earlier onslaught — with targeted sites soon reachable again — as emergency responders blunted them. Zhora’s office, Ukraine’s information protection agency, said responders switched to a different DDoS protection service provider.

Doug Madory, director of internet analysis at the network management firm Kentik Inc., recorded two attack waves each lasting more than an hour.
A spokesman for California-based Cloudflare, which provides services to some of the targeted sites, said Wednesday that DDoS attacks in Ukraine had been until then sporadic but on the rise in the past month but “relatively modest compared to large DDoS attacks we’ve handled in the past.”

The West blames Russia’s GRU for some of the most damaging cyberattacks on record, including a pair in 2015 and 2016 that briefly knocked out parts of Ukraine’s power grid and the NotPetya “wiper” virus of 2017, which caused more than $10 billion of damage globally by infecting companies that do business in Ukraine with malware seeded through a tax preparation software update.

The wiper malware detected in Ukraine this year has so far been manually activated, as opposed to a worm like NotPetya, which can spread out of control across borders.



Netanyahu Skeptical of an Iran Breakthrough

Israel's Prime Minister Benjamin Netanyahu leaves after a meeting with US President Donald Trump at the White House February 11, 2026, in Washington, DC. (Photo by Brendan Smialowski / AFP)
Israel's Prime Minister Benjamin Netanyahu leaves after a meeting with US President Donald Trump at the White House February 11, 2026, in Washington, DC. (Photo by Brendan Smialowski / AFP)
TT

Netanyahu Skeptical of an Iran Breakthrough

Israel's Prime Minister Benjamin Netanyahu leaves after a meeting with US President Donald Trump at the White House February 11, 2026, in Washington, DC. (Photo by Brendan Smialowski / AFP)
Israel's Prime Minister Benjamin Netanyahu leaves after a meeting with US President Donald Trump at the White House February 11, 2026, in Washington, DC. (Photo by Brendan Smialowski / AFP)

Israeli Prime Minister Benjamin Netanyahu said he was skeptical that US nuclear talks with Iran will lead to a breakthrough but described his meeting with US President Donald Trump at the White House as “excellent.”

Speaking to reporters Thursday in Washington before boarding a plane to return to Israel, Netanyahu said Trump’s terms and Iran’s “understanding that they made a mistake the last time when they did not reach an agreement, may lead them to agree to conditions that will enable a good agreement to be reached.”

While he said he did “not hide my general skepticism” about any deal, he stressed that any agreement must include concessions about Iran’s ballistic missiles program and support for militant proxies.

He added that the conversation Wednesday with Trump, which lasted more than two hours, included a number of other subjects, including Gaza and regional developments but focused on the negotiations with Iran.


German Court Rejects Palestinian's Claim over Weapons Exports

A view shows the front of the Reichstag building, the seat of the German parliament, the Bundestag, in Berlin, Germany March 5, 2025. REUTERS/Annegret Hilse/File Photo
A view shows the front of the Reichstag building, the seat of the German parliament, the Bundestag, in Berlin, Germany March 5, 2025. REUTERS/Annegret Hilse/File Photo
TT

German Court Rejects Palestinian's Claim over Weapons Exports

A view shows the front of the Reichstag building, the seat of the German parliament, the Bundestag, in Berlin, Germany March 5, 2025. REUTERS/Annegret Hilse/File Photo
A view shows the front of the Reichstag building, the seat of the German parliament, the Bundestag, in Berlin, Germany March 5, 2025. REUTERS/Annegret Hilse/File Photo

Germany's highest court on Thursday threw out a case brought by a Palestinian civilian from Gaza seeking to sue the German government over its weapons exports to Israel.

The complainant, supported by the European Center for Constitutional and Human Rights (ECCHR), had been seeking to challenge export licences for German parts used in Israeli tanks deployed in Gaza.

After his case was rejected by lower courts in 2024 and 2025, he had appealed to the Federal Constitutional Court.

But the court in Karlsruhe dismissed the case, stating that "the complainant has not sufficiently substantiated that the specialized courts misjudged or arbitrarily denied a possible duty to protect him", AFP reported.

While Germany is obliged to protect human rights and respect international humanitarian law, this does not mean the state is necessarily obliged to take specific action on behalf of individuals, the court said.

"It is fundamentally the responsibility of the state authorities themselves to decide how they fulfil their general duty of protection," it added.

The ECCHR called the decision "a setback for civilian access to justice".

"The court acknowledges the duty to protect but only in the abstract and refuses to ensure its practical enforcement," said Alexander Schwarz, co-director of the NGO's International Crimes and Legal Accountability program.

"For people whose lives are endangered by the consequences of German arms exports, access to justice remains effectively closed," he said.

The ECCHR had been hoping for a successful appeal after the Constitutional Court ruled last year that Germany had "a general duty to protect fundamental human rights and the core norms of international humanitarian law, even in cases involving foreign countries".

In that case, two Yemenis had been seeking to sue Berlin over the role of the US Ramstein airbase in a 2012 drone attack.

The complainant was one of five Palestinians who initially brought their case against the German government in 2024.

 

 

 

 


2 Israelis Charged with Using Classified Military Information to Place Bets

The Israeli Iron Dome air defense system intercepts missiles during an Iranian attack on Tel Aviv, Israel, June 18, 2025. (AP Photo/Leo Correa, File)
The Israeli Iron Dome air defense system intercepts missiles during an Iranian attack on Tel Aviv, Israel, June 18, 2025. (AP Photo/Leo Correa, File)
TT

2 Israelis Charged with Using Classified Military Information to Place Bets

The Israeli Iron Dome air defense system intercepts missiles during an Iranian attack on Tel Aviv, Israel, June 18, 2025. (AP Photo/Leo Correa, File)
The Israeli Iron Dome air defense system intercepts missiles during an Iranian attack on Tel Aviv, Israel, June 18, 2025. (AP Photo/Leo Correa, File)

Two Israelis have been charged with using classified military information to place bets on how future events will unfold, Israeli authorities said Thursday, accusing the individuals of “serious security offenses.”

A joint statement by the Israeli Ministry of Defense, domestic security service Shin Bet and police said that a civilian and a reservist are suspected of placing bets on the US-based prediction market Polymarket on future military operations based on information that the reservist had access to, The AP news reported.

Israel’s Attorney General’s Office decided to prosecute the two individuals following a joint investigation by police, military intelligence and other security agencies that resulted in several arrests. The two face charges including bribery and obstruction of justice.

Authorities offered no details on the identity of the two individuals or the reservist's rank or position in the Israeli military but warned that such actions posed a “real security risk” for the military and the Israeli state.

Israel’s public broadcaster Kan had reported earlier that the bets were placed in June ahead of Israel’s war with Iran and that the winnings were roughly $150,000.

Israel's military and security services “view the acts attributed to the defendants very seriously and will act resolutely to thwart and bring to justice any person involved in the activity of using classified information illegally,” the statement said.

The accused will remain in custody until the end of legal proceedings against them, the Prosecutor's Office said.

Prediction markets are comprised of typically yes-or-no questions called event contracts, with the prices connected to what traders are willing to pay, which theoretically indicates the perceived probability of an event occurring.

Their use has skyrocketed in recent years, but despite some eye-catching windfalls, traders still lose money everyday. In the US, the trades are categorized differently than traditional forms of gambling, raising questions about transparency and risk.