Whitepaper
Dissecting Russian State-sponsored Threat Actors
On 20.04.2022, CISA released a joint Cybersecurity Advisory to warn organizations that Russia’s invasion of Ukraine could expose organizations, also beyond the region, to increased malicious cyber activity. This is something that we at Conscia ThreatInsights anticipated already a month ago when we held a webinar about cyberwarfare and its implications on the broader community. […]
On 20.04.2022, CISA released a joint Cybersecurity Advisory to warn organizations that Russia’s invasion of Ukraine could expose organizations, also beyond the region, to increased malicious cyber activity. This is something that we at Conscia ThreatInsights anticipated already a month ago when we held a webinar about cyberwarfare and its implications on the broader community.
It is just a matter of time until the cyber-attacks spread around the globe. We already reported the new custom-developed malware targeting ICS and SCADA devices specifically. The joint CSA gives us great insights into Russian State-sponsored Threat Actors – the intelligence we were able to gather so far throughout the history of cyber-attacks. Such insights are crucial if we tend to successfully defend ourselves against potential future threats. The intelligence provided gives us the ability to know what kind of threat actors to expect, what are their typical TTPs and moreover, how to strengthen our cyber defenses.
Read this white paper ‘Dissecting Russian State-sponsored Threat Actors’ in its full length by filling out the form!
About the author
David Kasabji
Head of Threat Intelligence
David Kasabji is the Head of Threat Intelligence at the Conscia Group. He leads the development and delivery of actionable intelligence across cyber defense and managed security operations, translating complex threat activity into clear outcomes for different audiences — from SOC analysts and incident responders to executive stakeholders and external communications. His work spans end-to-end intelligence operations: collection and analysis of adversary activity, threat actor and campaign profiling, IOC and TTP development, and intelligence-driven guidance for detection, threat hunting, and security prioritization. David is also actively involved in Digital Forensics and Incident Response, supporting investigations and crisis situations with rapid triage, context, and strategic recommendations. A strong focus of his role is continuously improving how intelligence is operationalized through standardization and automation to ensure it is timely, relevant, and measurable.nd strategic crisis management during incidents.
Related