Ukrainian TRYZUB will help foreign specialists to repel cyberattacks

15 November 2024 11:16

The American company CYBER RANGES, together with the State Special Communications Service and CERT-UA, is launching the TRYZUB cyber training service. This was announced by Deputy Prime Minister for Innovation, Education, Science, and Technology – Minister of Digital Transformation Mykhailo Fedorov, "Komersant Ukrainian" reports.

The platform will simulate real cyberattacks on critical infrastructure in a secure environment. The service will reproduce the actions of large hacker groups that organized operations in Ukraine.

Military units, government and law enforcement agencies, as well as critical network operators from around the world will be trained on the TRYZUB platform.

The TRYZUB team will reportedly donate a portion of the training revenue to UNITED24 to support Ukraine.

For the first time, the war in Ukraine is also taking place in cyberspace

As you know, Ukraine has a Government Computer Emergency Response Team (CERT-UA) and a joint response team of the Ministry of Defense of Ukraine and the Armed Forces of Ukraine (MILCERT).

In the last few weeks alone, CERT-UA has detected the mass distribution of dangerous emails with tax-related topics and PDF attachments that imitated requests from the State Tax Service of Ukraine, and has also drawn attention to the distribution of suspicious messages using the Telegram account @reserveplusbot, which in May 2024 was listed as one of the ways to contact Reserve technical support.

CERT-UA has also been monitoring the activity of the UAC-0050 group for a long time. The group’s activities include cyber espionage, money theft, and information and psychological operations under the Fire Cells Group “brand”.

And in September, the government team, in cooperation with the security administrators of the Ochi ICS, specialists from the A0334 military unit and the joint response team of the Ministry of Defense of Ukraine and the Armed Forces of Ukraine MILCERT, detected and analyzed two cyberattacks, for the implementation of which the attackers used Signal to distribute messages among the military with links to download APK files, allegedly of the GRISELDA military system (automated system for entering, processing and transmitting information using artificial intelligence) and the Ochi surveillance system. The purpose of the attacks was to steal credentials to access special military systems, as well as to establish and transmit the device’s GPS coordinates.

Василевич Сергій
Editor

Reading now