How to protect yourself from cyberattacks: the Ministry of Defense gave advice to the military
27 March 18:51
The Ministry of Defense has described the most common methods of cyberattacks on the military, how to recognize them, protect yourself and your loved ones, and where to report cyber incidents.
The Defense Ministry published the information on its website, Komersant ukrainskyi reports.
Cybersecurity is a set of rules and actions that help protect your personal information and devices from intruders. It includes both technological solutions and proper user behavior in the digital space.
In the military context, cybersecurity is of particular importance. Leakage of data on the location of units, movement routes, or available weapons systems can lead to irreversible consequences. Therefore, understanding the basic principles of cyber defense is a must for every serviceman.
It is important to realize that the enemy is constantly adapting and improving its methods. Therefore, even experienced users can become victims of cyberattacks. The key to security is constant vigilance and the ability to critically evaluate any information received through digital communication channels.
Phishing is one of the most common types of cyberattacks aimed at obtaining confidential information through manipulation and deception. The name of this method comes from the English word fishing, which accurately reflects its essence: attackers “throw a bait” and wait for the victim to “bite”.
A typical scenario of a phishing attack on a military officer looks like this: you receive a message allegedly from your superior or military leadership, demanding urgent action: “You need to urgently update your data in the DELTA system or you will lose access to your account!”, “The military unit is preparing lists for receiving supplies, fill out a questionnaire”, or “Unauthorized access to your account has been detected, please update your password immediately”. Similar messages may also come from fraudsters masquerading as civilian institutions such as banks or postal operators.
As a rule, such messages contain a link to a website that is visually almost identical to the original, but is actually a fake. When the victim enters their data on such a website (login, password, bank details, etc.), this information is instantly obtained by the attackers. They can use it to access your social networks, messengers, or mobile banking.
The enemy is particularly active in compromising messenger accounts, which are often used by the military. If an attacker gains access to your Signal or WhatsApp, they can not only send phishing links to your contacts, but also access group chats where sensitive information is discussed.
To protect yourself from phishing attacks
- always check the URL of a website before entering personal information. Pay attention to minor spelling changes (for example, “diia.org.ua” instead of “diia.gov.ua”);
- do not follow links from suspicious messages. It is better to open the official website of the service manually through a browser;
- if you receive an alarming message from a bank or government agency, contact them directly through official contacts;
- never scan QR codes from unconfirmed sources to avoid losing access to your messenger accounts;
Malicious software (viruses) are special programs created to damage, steal data or gain unauthorized access to devices. Unlike phishing, which requires active actions from the user, a virus can work autonomously and often goes unnoticed for a long time.
Viruses pose a particular threat to the military because they can
- intercept GPS coordinates and transmit location data to the enemy
- turn on the microphone and camera without the user’s knowledge
- copy photos, messages and contacts
- access files that may contain tactical information.
Malware is often spread through phishing emails with attachments and infected flash drives. Even ordinary Word or PDF documents, Excel spreadsheets, pictures, and even videos can contain malicious code. Another common method is fake applications that masquerade as legitimate programs.
To protect yourself from malware
- install apps only from official sources: App Store, Google Play, or official developer websites;
- update your operating system and applications regularly. Most updates contain fixes for known vulnerabilities;
- do not open attachments from strangers. If you received a file from a familiar contact but did not expect it, contact the sender via an alternative channel and make sure the file is authentic;
- use reliable antivirus software and scan your devices regularly.
For more information on how to protect your personal devices from hacking and malware, please follow the detailed instructions here.
Strong passwords are the foundation of digital security. However, many users neglect this aspect by using simple combinations or the same passwords for different services. Attackers actively exploit these weaknesses.
The main methods of compromising passwords include:
- automated hacking – attackers go through passwords or use ready-made lists of the most common combinations, which allows them to quickly find the right option;
- interception in unsecured networks – especially relevant when using public Wi-Fi;
- use of data from previous leaks – if your password is stolen from one service and you use the same combination elsewhere, attackers will try to gain access to all your accounts;
Military personnel should adhere to higher standards of password protection:
- create unique passwords of 15 characters or more that include uppercase and lowercase letters, numbers and special characters;
- do not use the same password for different services;
- avoid using personal information in passwords (dates of birth, names of loved ones, military unit numbers);
- activate two-factor authentication for all important accounts. This is an additional level of protection that requires entering an additional confirmation factor – usually a code generated in a special application;
- use password managers such as 1Password or LastPass to store passwords and generate strong combinations.
It is important to remember that one-time verification codes should never be shared with unauthorized persons, even if they claim to be employees of banks or government agencies.
If you are a victim of a cyberattack or suspect fraudulent activity, it is important to immediately notify the appropriate authorities. A quick response can help not only solve the problem but also prevent the threat from spreading further.
In case of compromise of personal data not related to official activities, you should immediately change passwords and write a statement to the Cyber Police Department of the National Police at the link.
In case of a breach of proprietary information or a device, contact specialized cybersecurity authorities.