Dr. Oleksandr Kyselevskyi

Dr. Oleksandr Kyselevskyi

Dr. Oleksandr Kyselevskyi is one of the founders, Acting Managing Partner, Member of Supervisory Board and Chief Scientific Advisor of the Intecracy Group in Ukraine. He has extensive experience in scientific research in the fields of Applied mathematics, Mathematical modelling; Telecommunications; Complex Systems control, Modelling & optimization; IT Security/Cyber Security; Cryptography and its applications (including technology of full information cryptographic protection).

Part 5

In this blog, I examine some common types of Data-stealing Malware, attempted Cyberattacks on Apple Mac OS and Cryptocurrency Cyber-attacks.

Information-stealing malware: iOS and OSX malware

Phone numbers, email addresses, and other contact details are valuable information for malware writers. Many malicious or potentially unsuitable applications (PUAs) may attempt to collect this data from infected devices and send it to attackers. Apart from sending SMS messages to invite users to install malicious apps, some attackers also spread them through Twitter and WhatsApp messages. In Japan, a group behind the Godwon Infostealer malware collected contact details and then attempted to extort users, after sharing compromising photos and videos with attackers.

Petya (also known as Petya.A, Petya.D, Trojan.Ransom.Petya, PetrWrap, NotPetya, ExPetr, GoldenEye) - malware, worm and ransomware program that affects computers running Microsoft Windows.

The Petya virus was first discovered in March 2016. At that time Check Point noted that while Petya had infected fewer computers than other ransomware, such as CryptoWall, the behaviour of the new virus iwas markedly different. Petya was immediately marked as the next step in the evolution of ransomware. The program required 0.9 bitcoins to restore access to files to the user (this equated to about US$380 as of March 2016).

Cyber attacks at the National state level are generally the most dangerous and costly. Those who dare to hold such an attack, unlike ordinary hackers are not in pursuit of financial gain. At my presentations, seminars and lectures on cybersecurity, I usually commence with the following slide, which as can be seen, place Nation-state cyber-enabled attacks at the top of the danger scale.

Part 4

Part 3 of this article covers ransomware types and cyber security recommendations.

Part 3

Part 2 of this article highlights especially dangerous threats such as attacks on critical infrastructure and cyber espionage.

Before trying to answer this question, let's try to understand what Information Security (IS) is. Are we talking about the security of one's own information? Is the information confidential? An advanced computer user may use such terms as: network protection, or antivirus.

As already widely reported, on Tuesday 27 June 2017, Government and Private sector servers in Ukraine suffered a large-scale cyber-attack.

The attack began at about 11:30 am and the damaging virus spread very quickly, targeting key Ukrainian institutions, including banks. The attack was manifested in a failure of Windows platform, with computers becoming overloaded and data being encrypted.

Part 2

Part 1 of this article highlights stages of cyber security development and explains the difference between Internet layers.

This article highlights key areas of security of state information resources and the reliable operation of critical infrastructures in the areas of defence, national security, finance, energy, telecommunications, as well as private company cybersecurity issues.


« March 2018 »
Mon Tue Wed Thu Fri Sat Sun
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  


© 2016 Intecracy International Limited

Intecracy Power of Intellect® and logo is a registered trademark of Intecracy International Limited