Trend Micro Security

Ukraine Crisis Cyber Impact
Resource Center

Best practices and readiness tools for at-risk organizations


Guidance  |  Articles + Blogs  |  Technical Resources  |  Get Help

Trend Micro is closely monitoring the evolving cyber threat activity related to the Russian invasion of Ukraine. We are focused on protecting our customers and partners that may be affected by these threats, and to that end, we are providing resources and guidance.

Our research teams and threat hunters will work vigilantly to monitor and identify any new threat intelligence and will continue to share updates. If attacks extend beyond the current region, we will be there to lend our support.

Section 0 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 0 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

What you can do now

Security posture


Revisit your overall security posture and ensure that you have fully deployed and properly configured your protection around best practices—similar to fortifying your environment against ransomware and destructive attacks. Enable specific controls, such as ransomware protection and behavioral monitoring, and make sure EDR is deployed on critical assets. 

Updates and patches


Ensure all products and technology have the latest updates and patches—many attacks start with exploits of known vulnerabilities that may have already been patched. Take note of high-severity vulnerabilities and external-facing servers and infrastructure. 

Suspicious activity


Be vigilant around suspicious activity in your network and digital environment. Pay attention to new/unusual traffic and abnormal activity within operations. Monitor any early warning detection alerts and request assistance if needed.

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Knowledge Base Articles and Blogs

SECURITY ALERT: Recommendations for Enhanced Security Posture in Light of Heightened Global Cyber Threat Activity

This knowledge base article for Trend Micro customers and partners provides relevant support and advisories from various government cybersecurity agencies around the world.

Global Cyberattacks Tied to the Russian Invasion of Ukraine

With so much diversity in the attack surface, we provide security best practices to manage your cyber risk.

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

Our latest blog delivers timely insight into the rising importance on improving cyber-resilience, threat detection, and response.

Keeping Safe with Trend Micro Security During These Uncertain Times

While the focus often remains on cyber hygiene from an organizational standpoint, it is important to keep your family safe online during this crisis. This blog provides you with valuable tips.

Cyberattacks are Prominent in the Russia-Ukraine Conflict

Alongside the conflict between Russia and Ukraine, there’s an increasing number of alleged cyberattacks perpetrated by different groups. We verify internal data and external reports to provide accurate information that can be used to strengthen defenses.

Keeping Safe with Trend Micro Security During These Uncertain Times

While the focus often remains on cyber hygiene from an organizational standpoint, it is important to keep your family safe online during this crisis. This consumer-facing blog provides you with valuable tips and reminders.

Global Cyberattacks: Managing Risk in Chaotic Times

With so much diversity in the attack surface, we provide security best practices to manage your cyber risk.

Keeping Safe with Trend Micro Security During These Uncertain Times

While the focus often remains on cyber hygiene from an organizational standpoint, it is important to keep your family safe online during this crisis. This consumer-facing blog provides you with valuable tips and reminders.

Technical Resource

Thumbnail_TAOC-PDF.png

Read about the Indicators of Compromise:

IOC Resource for Russia-Ukraine Conflict-Related Cyberattacks 

Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Need Additional Help?

We invite you to reach out with any questions. We will be happy to help you in any way we can.

  Get help today

Section 5 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.