Microsoft says it uncovered a new malware strain in Ukraine hours before invasion began

FoxBlade malware strain was added to Microsoft Defender within hours of its discovery

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Microsofthas revealed that it discovered a newmalwarestrain just a few hours before Russia began its invasion of neighboring Ukraine.

In a newblog post, the software giant explained that one of its principal responsibilities as a software and cybersecurity company is to help defend both governments and countries from cyberattacks. As such, Microsoft has been paying close attention to the events going on in Ukraine.

Microsoft’s Threat Intelligence Center (MSTIC) has been monitoring the situation closely and several hours before Russia’s invasion of Ukraine began, it detected a new round of cyberattacks targeting the country’s digital infrastructure.

In addition to advising the Ukranian government on the matter, Microsoft’s security team identified the use of a new malware package, which it has dubbed FoxBlade, and provided technical advice on the steps needed to prevent falling victim to it. In fact, within three hours, signatures used to detect FoxBlade activity were added toMicrosoft Defenderto help defend against this new threat.

Precisely targeted cyberattacks

Precisely targeted cyberattacks

Over the course of the past few days, Microsoft has provided both threat intelligence and defensive suggestions to Ukrainian official regarding attacks on a range of targets including Ukrainian military institutions, manufacturers and several other government agencies.

According to Microsoft, these ongoing cyberattacks have been precisely targeted and the company hasn’t seen the use of indiscriminate malware technology across Ukraine’s economy and beyond its borders since theNotPetyaattack in 2017.

Anonymous launches “cyber war” against Russia

TrickBot malware has been taken over by this notorious criminal gang

Raspberry Pi can now detect malware without any software

The company also remains concerned regarding recent cyberattacks on civilian digital targets including the financial sector, agriculture sector, emergency response services, humanitarian aid efforts and energy sector organizations in Ukraine. These attacks on civilian targets raise serious concerns under theGeneva Conventionwhich is why Microsoft has shared all of the information it has on them with the Ukrainian government.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Besides cyberattacks, there have also been efforts to steal a wide range of data including health, insurance and transportation-related personally identifiable information (PII) from Ukrainian citizens.

We could potentially hear more from Microsoft on its cybersecurity efforts in Ukraine if cybercriminals and nation state hackers alike continue to target the country and its citizens.

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

This new phishing strategy utilizes GitHub comments to distribute malware

Smeg Combi Steam Oven review: a multi-functional countertop oven that looks stunning and cooks well