Cyber Security Lessons From The Ukraine War

After a lengthy military buildup on Ukraine’s borders, on 24 February 2022, Russian President  Putin finally ordered Russian troops to invade Ukraine and as the war escalates, cyber security has grown in significance. 

Numerous organisations, commercial businesses and many individuals are taking action in defence of Ukraine  by contributing various technological resources in which cyber security playa a vital role. 

According to US and UK government assessments, the Russian offensive has a major cyber component that could potentially affect parties in multiple locations, including Ukraine, NATO countries, and their allies.  Indeed, by the beginning of March 2022, before the military campaign began, there had been over 150 cyber attacks on Ukraine. Microsoft's Threat Intelligence Center (MSTIC) reports that it detected "destructive cyberattacks directed against Ukraine's digital infrastructure" hours before the first launch of missiles or movement of tanks. 

Over a few weeks the conflict has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyber attacks on computer networks and Internet-based disinformation campaigns. 

Cyber security in space is another emerging front. Since the end of the  Cold War, Russia, NATO, and the United States have favoured cooperation in this arena while retaining neutrality, however, space is likely to be the next focus of cyber warfare, with many potential threats such as hacking satellites

The current conflict highlights how important it is  for companies, organisations  and even entire nations  to secure their networks.

As security experts have been monitoring Russia’s cyber activity for years, various hacker groups, like Anonymous, are now actively participating in the conflict. This is a new phenomenon concerning hacker groups, which are actually expanding the battlefield out of geographical boundaries. Streaming and television services were also targeted as part of the attack and even the Kremlin’s main website was hacked.

Cyber attacks on Ukrainian have including the financial sector, agriculture, emergency response services, humanitarian aid efforts, as well as the energy sector organisations and enterprises. 

At a personal level, citizens are also learning that it is essential to perform multiple authentication procedures, change passwords frequently, and restrict access to information, since today, it is clear that one mistake is enough to bring down an entire security system. 

Other types of cyberwar are more open and official. Meta, the company that owns Facebook, has blocked some Russian media on its platforms. In retaliation, Russia has limited access to Facebook.

All these attacks are essentially attacks on civilians  and raise serious concerns under the Geneva Convention. 

Defacement attacks that delete information on websites or change the information that appears there are a basic misinformation tactic that can mislead the general public into thinking fake information is reliable.  It's one of the oldest  tactics of warfare, when actors in a war flood a civilian population with misleading information and ts effect is largely psychological, but very powerful.

Microsoft:     I-HLS:      Harvard Business Review:    Accenture:     DW

You Might Also Read:

The App At The  Frontline Of Information Warfare:

 

« The Pentagon Gets $250m Extra To Spend On AI
Multimillion-Dollar Business Email Fraud Gang Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Conference-Service

Conference-Service

Conference-Service provides a categorised calendar of conferences and events, including Information Security & Privacy.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

Intrepid Solutions & Services

Intrepid Solutions & Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.