RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
June 30, 2022

The Week in Cybersecurity: NATO creates cyber rapid response

International relations intersects with cybersecurity, learn how to leverage YARA rules, plus new developments on AstraLocker 2.0.

paul roberts headshot black and white
Paul Roberts, Director of Content and Editorial at RLPaul Roberts
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The Week in Cybersecurity: NATO creates cyber rapid response

Welcome to the The Week in Cybersecurity, which brings you the latest headlines from both the world and our team at ReversingLabs about the most pressing topics in cybersecurity. This week: International relations intersects with cybersecurity, learn how to leverage YARA rules, plus new developments on AstraLocker 2.0.

This week’s top story

As tensions mount, NATO creates cyber rapid response

The war in Ukraine is well past the 100-day mark, and, like most other aspects of the conflict, the battlefront in the cyber conflict between the countries has shifted over time. As with its kinetic activities, Russia began its invasion with a 'shock and awe' campaign of cyber attacks. That included the hack of Viasat, a U.S. satellite communications firm used by Ukraine's military. It also included the release of a series of custom "wiper" malware programs, akin to the notorious NotPetya wiper that devastated Ukraine's public and private sector in 2017. (Check out our post from March on Hermeticwiper and Isaacwiper, two new wiper variants seen in the Ukraine conflict.)

Those initial forays were a mixed bag for Russia, which faltered badly in the early days of the war. Since then, however, the cyber component of the conflict has devolved into tit-for-tat attacks between Russia, Ukraine and even Ukraine's allies on both sides of the Atlantic. A report from Microsoft documented Russian cyber attacks on 128 organizations in 42 countries outside Ukraine in recent months, with the U.S., Poland, the Baltic nations, Denmark, Norway, Finland, Sweden and Turkey in Moscow's sites. In the meantime, hacking groups sympathetic with Ukraine launched attacks that delayed the St. Petersburg International Economic Forum, which some refer to as the Russian DAVOS. More recently, the Russian firm ROSCOSMOS was hacked after posting satellite images of NATO bases.

With cyber rapidly declaring itself as a full fledged domain of conflict, NATO is moving to solidify its role in countering Russian attacks on its members. As Politico reported, NATO members meeting in Madrid agreed to create a “virtual rapid response cyber capability” to counter Russian cyberattacks in Ukraine, That comes amid concerns that Moscow may target the United States and other NATO countries in retaliation for assistance to Ukraine. Under the new plan, NATO will act as a coordination platform for offering national assets to build and exercise a virtual rapid response cyber capability to respond to a serious cyber-attack. The United States will offer robust national capabilities as part of this support network, according to a statement on the summit released by the Whitehouse.

Get software security key takeaways from a survey of 300+ professionals Download the related report: Flying Blind: Firms Struggle to Detect Software Supply Chain Attacks

The stories we’re paying attention to this week

Cybersecurity Researchers Launch New Malware Hunting Tool YARAify (Infosecurity Group)

A group of security researchers from Abuse.ch and ThreatFox launched a new hub for scanning and hunting files. Dubbed YARAify, the defensive tool is designed to scan suspicious files against a large repository of YARA rules.YARAify (yaraify.abuse.ch) can scan files using public YARA rules and integrate both public and non-public YARA rules from Malpedia, which is operated by the Fraunhofer Institute in Germany.

Over 900K Kubernetes Instances Found Exposed Online (BleepingComputer)

Over 900,000 misconfigured Kubernetes clusters were found exposed on the Internet to potentially malicious scans, some even vulnerable to data-exposing cyberattacks.

Latest OpenSSL Version is Affected by a Remote Memory Corruption Flaw (Security Affairs)

Security expert Guido Vranken discovered a remote memory-corruption vulnerability in the recently released OpenSSL version 3.0.4. The library was released on June 21, 2022, and affects x64 systems with the AVX-512 instruction set.

AMD targeted by RansomHouse, claimed to have stolen 450 GB of data (The Register)

If claims hold true, AMD has been targeted by the extortion group RansomHouse, which says it is sitting on a trove of data stolen from the processor designer following an alleged security breach earlier this year.

LockBit 3.0 introduces important novelties, including a bug bounty program (Security Affairs)

The Lockbit ransomware operation has released LockBit 3.0, which has important noveòties such as a bug bounty program, Zcash payment, and new extortion tactics. The gang has been active since at least 2019 and today it is one of the most active ransomware gangs.

In case you missed it

Here are the posts that went live this week from the ReversingLabs Blog and develop.secure.software.

Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs

ReversingLabs recently discovered instances of the AstraLocker 2.0 malware distributed directly from Microsoft Word files used in phishing attacks.

SBOM Facts: Know what’s in your software to fend off supply chain attacks

Not knowing what’s in your food can have consequences. The same is true for software. That’s why you need a software bill of materials (SBOM) to minimize software security risk.

Copilot's rocky takeoff: GitHub ‘steals code’

Should you use GitHub Copilot? “No,” say open-source fans. “Heck no,” say lawyers. “Yeah,” say the sort of devs who do Stack Exchange copypasta without a second thought.

Tags:Modern SOC

More Blog Posts

envelopes with pixelated bugs crawling out of them

How to Stop Phishing Attacks Being Missed

Unveiling the Hidden Threats: Enhancing Email Security with Object-Level Analysis

Learn More about How to Stop Phishing Attacks Being Missed
How to Stop Phishing Attacks Being Missed
laptop screen with green shield checkmark being labelled as malicious

How SOC analysts and threat hunters can expose malware undetected by EDR

Enhancing Endpoint Visibility: Leveraging Advanced File Intelligence to Uncover Evasive Threats

Learn More about How SOC analysts and threat hunters can expose malware undetected by EDR
How SOC analysts and threat hunters can expose malware undetected by EDR
reversinglabs elastic threat infrastructure new updates

ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams

...

Learn More about ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams
ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams
The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

Vice Society ransomware group targets America’s education sector, the U.S. government’s new position on software supply chain security, and more.

Learn More about The Week in Cybersecurity: Vice Society ransomware group targets back-to-school
The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top