Recurring |
one_organization, multiple_organization |
(a) The software failure incident having happened again at one_organization:
- The article reports that Ukraine has been hit by more cyber-attacks, with the latest incident being the third wave of attacks against Ukraine this year and the most sophisticated to date [124620].
- In January, the Ukrainian government accused Russia of being behind another DDoS wave and smaller, less sophisticated wave of "wiper" attacks [124620].
(b) The software failure incident having happened again at multiple_organization:
- The article mentions that DDoS attacks have been used in various campaigns as part of Russia's "hybrid warfare" tactics, combining cyber-attacks with traditional military activity. DDoS attacks have hit Georgia, Crimea, and Ukraine in the past, with the EU, UK, and Ukraine blaming Russian government hackers for attacks on electricity substations and the NotPetya "wiper" attack that caused widespread damage globally [124620]. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase can be seen in the discovery of a new "wiper" attack, named HermeticWiper, used against Ukrainian organizations. Cyber-security experts at ESET and Symantec recorded this sophisticated "wiper" malware, indicating a planned attack since December 2021 [124620].
(b) The software failure incident related to the operation phase is evident in the Distributed Denial of Service (DDoS) attacks that targeted Ukrainian websites, including those of banks and government departments. These attacks flooded the websites with huge amounts of requests, causing them to become inaccessible and crash [124620]. |
Boundary (Internal/External) |
within_system |
(a) within_system: The software failure incident reported in the articles is primarily within the system. The incident involved cyber-attacks, specifically DDoS attacks and the deployment of a sophisticated "wiper" malware named HermeticWiper, targeting Ukrainian organizations [124620]. These attacks were aimed at disrupting the functioning of Ukrainian websites, banks, and government departments by flooding them with requests until they crashed or destroying data on infected machines. The attacks were described as the third wave of attacks against Ukraine in the year and were considered the most sophisticated to date [124620].
(b) outside_system: The articles do not provide information indicating that the software failure incident was primarily due to contributing factors originating from outside the system. The focus of the incident was on the cyber-attacks targeting Ukraine, with no official blame directed at Russia for the latest attacks [124620]. The incident was part of a series of attacks against Ukraine, with previous attacks also being attributed to Russian hackers. However, the specific details in the articles do not highlight external factors as the primary cause of the software failure incident. |
Nature (Human/Non-human) |
non-human_actions |
(a) The software failure incident occurring due to non-human actions:
The software failure incident in the news article was primarily attributed to a cyber-attack involving a "wiper" malware that destroys data on infected machines. This attack was described as the third wave of attacks against Ukraine and was considered the most sophisticated to date. The malware, named HermeticWiper, was discovered by cyber-security experts at ESET and Symantec, indicating that the failure was caused by non-human actions introduced by malicious software [Article 124620].
(b) The software failure incident occurring due to human actions:
While the article does not explicitly mention any software failure incident being directly caused by human actions, it does discuss the involvement of human actors in terms of cyber-attacks. The attacks on Ukrainian websites were attributed to Russian hackers, with previous attacks also being linked to Russia. However, no official blame was directed at Russia for the latest attacks mentioned in the article [Article 124620]. |
Dimension (Hardware/Software) |
hardware, software |
(a) The software failure incident occurring due to hardware:
- The article mentions a new "wiper" attack, which destroys data on infected machines, being used against Ukrainian organizations [124620].
- Cyber-security experts at ESET and Symantec discovered a new data wiper malware called HermeticWiper that was installed on hundreds of machines in Ukraine [124620].
(b) The software failure incident occurring due to software:
- The incident involved DDoS attacks on Ukrainian websites, which are designed to knock a website offline by flooding it with huge amounts of requests until it crashes [124620].
- The article discusses the use of a sophisticated "wiper" malware named HermeticWiper in the attack, indicating a software-related issue [124620]. |
Objective (Malicious/Non-malicious) |
malicious, non-malicious |
(a) The objective of the software failure incident was malicious, as the cyber-attacks on Ukrainian websites, including banks and government departments, involved the use of a "wiper" attack that destroys data on infected machines. The attack was described as being on a "completely different level" and represented the third wave of attacks against Ukraine this year, with the most sophisticated tactics to date [124620]. Additionally, the attack involved the deployment of a new data wiper malware named HermeticWiper, which was installed on hundreds of machines in Ukraine, indicating a planned and targeted malicious intent [124620].
(b) The software failure incident was non-malicious in the sense that Distributed Denial of Service (DDoS) attacks were also part of the cyber-attacks on Ukrainian websites. DDoS attacks are designed to knock a website offline by flooding it with huge amounts of requests until it crashes. While these attacks can disrupt services, they are typically not aimed at directly harming the system or destroying data, unlike the wiper attack mentioned in the incident [124620]. |
Intent (Poor/Accidental Decisions) |
poor_decisions |
(a) The intent of the software failure incident related to poor_decisions:
- The article mentions that the cyber-attacks on Ukrainian organizations, including the use of a sophisticated "wiper" malware named HermeticWiper, were planned since at least 28 December 2021, indicating a deliberate and premeditated nature of the attacks [124620].
- The attacks are part of a series of waves of attacks against Ukraine, with the latest incident being described as the most sophisticated to date, suggesting a strategic and planned approach rather than accidental decisions [124620].
(b) The intent of the software failure incident related to accidental_decisions:
- There is no specific mention or indication in the article that the software failure incident was due to accidental decisions or unintended mistakes. The focus is more on the deliberate and sophisticated nature of the cyber-attacks against Ukrainian organizations [124620]. |
Capability (Incompetence/Accidental) |
accidental |
(a) The software failure incident related to development incompetence is not explicitly mentioned in the provided article. Therefore, it is unknown if the failure was due to contributing factors introduced due to lack of professional competence by humans or the development organization.
(b) The software failure incident related to accidental factors is evident in the article. The article discusses a cyber-attack on Ukrainian websites, including banks and government departments, involving a new "wiper" attack that destroys data on infected machines. This incident is described as the third wave of attacks against Ukraine this year and the most sophisticated to date. The attack involved Distributed Denial of Service (DDoS) attacks, which are designed to knock a website offline by flooding it with huge amounts of requests until it crashes [124620]. |
Duration |
temporary |
(a) The software failure incident described in the articles is temporary. The incident involved a series of cyber-attacks, including Distributed Denial of Service (DDoS) attacks and the deployment of a sophisticated "wiper" malware, targeting Ukrainian websites, banks, and government departments [124620]. The attacks caused outages and made websites inaccessible, but most of the affected websites were restored within a few hours [124620]. The incident represents the third wave of attacks against Ukraine this year and is considered the most sophisticated to date [124620]. The attacks were attributed to Russia, but no official blame was directed at Russia for the latest attacks [124620]. |
Behaviour |
crash, omission, value, byzantine, other |
(a) crash: The incident involved Distributed Denial of Service (DDoS) attacks on Ukrainian websites, causing them to become inaccessible and potentially crash due to the overwhelming amount of requests flooding the sites [124620].
(b) omission: The DDoS attacks resulted in the omission of the intended functions of the websites, as they were unable to serve their content to users and became inaccessible [124620].
(c) timing: The DDoS attacks occurred on Wednesday afternoon, causing outages and intensifying in severity over the course of the day, indicating a timing issue where the attacks happened at a specific time [124620].
(d) value: The incident involved a sophisticated "wiper" malware named HermeticWiper, which was used to destroy data on infected machines, indicating a failure in the system performing its intended functions incorrectly by wiping data [124620].
(e) byzantine: The DDoS attacks and the use of the wiper malware by cyber attackers represent a form of byzantine behavior, where the attackers are behaving erroneously with inconsistent responses and interactions, making it challenging to defend against such attacks [124620].
(f) other: The incident also involved a combination of cyber-attacks with traditional military activity, showcasing a hybrid warfare tactic that goes beyond typical software failure behaviors [124620]. |