Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine

Russia’s war on Ukraine is now being fought with bombs as well as bytes, causing European nations to engage with improving their cyber defence capabilities.

As cities in Ukraine come under attack from Russian forces, a digital offensive will often also be part of the invasion and this effect could increase under the threat of sanctions from the West.

One country they can learn a lot from is Estonia. The nation, which shares a border with Russia, was one of the first to come under attack from this modern form of hybrid warfare 15 years ago.

Since then, this small nation that has a population of 1.3 million people has built its cyber defence infrastructure and ranks third-best in the world behind the United States and Saudi Arabia, according to the Global Cybersecurity Index (GCI).

Estonia has been occupied twice throughout its history. The last time was by the Soviet Union, from 1940 until 1991. Since then, the country put in all the protections to ensure this could not happen again. “There was this short opportunity window when Russia was going in, I assume, by our estimates, the right direction. And then we used this opportunity window to join all the possible clubs that we could, which is NATO, which is the European Union,” Estonia’s Prime Minister Kaja Kallas said at a press gathering. “And then actually, we had people asking us, why do you need this? Because Russia doesn't pose a threat anymore. And we said, ‘we know our neighbour’”.

On 24 February, as Russian troops entered Ukraine, a cyber attack disrupted communication networks in Donbas. These attacks affected not only physical but especially space infrastructure. Cyber activity knocked out communication satellites from Viasat, an American firm providing space-based broadband services across Europe.

Consequently, the attacks affected Ukraine and other European customers that rely on the firm’s services. This invasion of Ukraine by Russia has brought back painful memories in Estonia. “Being in the geographical location where we are, you have two choices: Either to be with the West, to be with Europe or to be with Russia,” Kallas said.

Other countries that have recently followed Estonia’s path and are bidding to join NATO are Sweden and Finland. Asked how Russia could react, Kallas responded: “We are probably going to see cyber attacks. We're going to see some showing of power. But I think that's about it”. Kallas did not appear too worried about more possible cyberattacks. Perhaps because Estonia already learned the lessons of how to respond to them in the past.

The story begins in 2007 and comes down to a statue and fake news. The Bronze Soldier was unveiled by the Soviet authorities in 1947 and back then was called the “Monument to the liberators of Tallinn” and sat in the capital. Russian speakers in Estonia believe the monument represents the USSR’s victory over Nazism but for many ethnic Estonians, the Soviet soldiers were occupiers rather than liberators, and the statue is a reminder of that. In 2007, the Estonian government moved the Bronze Soldier from Tallinn to the outskirts of the city to a military cemetery. 

Protests were then triggered by false claims by Russian media that the statue and Soviet war graves were being destroyed by Estonia’s government. A day later, Estonia was hit by cyber attacks, which lasted weeks and knocked  out Estonian banks, government bodies and the media.

Exactly who was behind the attacks is unknown. The cyber attacks came from Russian IP addresses and the government has always denied any involvement.

“It has been called by many experts Web War one and at the time what the effect that had was that we really realised the vulnerability of the digital society and the digital infrastructure that we were building,” Luukas Ilves, Chief Information Officer for Estonia’s Government told Euronews. “It made us aware, maybe some years before the rest of the world, of the risks around cyber attack and cyber insecurity”.

Estonia is one of the leading digital nations and a large part of how the public interacts with the government is done digitally, from voting and paying taxes to setting up companies and verifying identity. The backbone of this digital society is X-Road, a software solution which acts like a distributed government information system and binds together different databases and different organisations. “If something happens to one part of the system, there is another part of the system that takes over, that everything is backed up into various locations, that you don't have a single point of failure,” Oliver Väärtnõu, CEO of Cybernetica, the company which developed X-Road, told Euronews.

When the same question was put to Estonia’s Prime Minister, she replied: “What I can tell you, because this is a very difficult position. I hear things in the secret rooms that I can't talk about. I would say that we don’t talk about things publicly but going to [cyber] offensive brings about different risks that you don’t put back in a bottle.. I can't say we don't and I can't say we do but I would answer that if we do, we are not talking about this,” she added when pushed on the topic.

While governments remain tight-lipped on the issue of cyber offence development, it appears to be an open secret and in Ukraine’s case a necessity.

“I think there is no real secret anymore that governments develop their offensive (cyber) capabilities. And partly why Ukraine has been successful is that they have created this cyber army that is putting on so-called active defence, which is an offensive defence to put it in other words,” said Väärtnõu.

Estonia’s government sees the development of cyber security as a constant investment and says it is always looking at ways to improve and build more complicated systems. The country also believes it can learn a lot from the war in Ukraine and should keep a close eye on Russian cyber activities.

Euronews:        Euronews:       NPR:       EPC:      Yahoo:    BizCrast

You Might Also Read: 

NATO Will Retaliate:

 

« An Airline Brought To A Standstill By Ransomware
Ransomware’s Serious Effects On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Aleo

Aleo

Aleo is building the world's leading developer platform for enabling absolute privacy on blockchains.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.