NATO Prepares For Cyber Warfare

This month, NATO engaged its cyber forces in Cyber Coalition 2022, a cyber exercise in Estonia simulating a cyber attack on a fictional island to prepare for anticipated cyberwar.  As conflicts have morphed from traditional military methods into the complex domain of cyberspace, around 150 NATO cyber security experts convened in Tallin to prepare for an anticipated cyberwar. 

The Cyber Coalition 2020 exercise involved more than 40 member states, allies and other organisations working  together to respond to and recover from, simulated cyber attacks on critical infrastructure like power grids and ships. The exercise spanned the globe, with nearly 1,000 cyber professionals participating remotely from their home countries.

In particular, NATO is closely monitoring the war in Ukraine, to help Ukraine and make it harder for Russia and other adversaries to hack into infrastructure in NATO member states and their allies.

Recently, hackers affiliated with Russian military intelligence launched destructive malware attacks against energy, water, and other critical infrastructure in Ukraine, simultaneously with missile strikes aimed at destroying power and water supplies to civilians across the country.  Russian hackers have also attacked in Poland, targeting a critical logistics hub, in a possible attempt to disrupt the movement of weapons and supplies.

On the information warfare front, Russia has increased the intensity of popular dissent over energy and inflation across Europe by boosting select narratives online through state-affiliated media outlets and social media accounts to undermine elected officials and democratic institutions.  So far this propaganda has had only limited public impact, but they foreshadow what may become broadening tactics during the winter ahead.

The world has never experienced an all-out cyberwar in which cyber attacks are used to the same devastating effect as physical strikes, such as shutting off critical services like power and water and preventing their restoration. 

NATO has been intentionally ambiguous about what level of cyber attack it would take for members to respond with either force or devastating cyber strikes of their own. The coalition’s cyber experts have been closely monitoring the war to learn lessons to prepare member states against cyber attacks carried out by adversaries. 

NATO is also reviewing how vulnerable their critical networks in NATO states are to cyber attacks. Those can run from sophisticated operations to plant malware on software updates to more common ransomware attacks.

The intensified pressure on cyber professionals within NATO countries and allied nations has made the ability to coordinate and test communication protocols essential. Both Finland and Sweden, have discarded their previous neutrality to apply for NATO membership and were included in the exercise. However, separate reports suggest that, despite the unprecedented intensity of cyber-attacks launched by Russia over the past few months, Ukrainians have defended remarkably well – learning the lessons from previous attacks on critical infrastructure in December 2015 and 2016.

What has not been so well analysed are the implications of the war in Ukraine for NATO force's preparations for fighting a future “great-power war.” Moscow’s major invasion of Ukraine is the first open war of this era and, like the Spanish Civil War which preceded World War 2, may prove to be a testing ground of operations and tactics for future conflicts. 

Politico:      Al Mayadeen:      Microsoft:      Infosecurity Magazine:    Just Security:    Yahoo:  

You Might Also Read: 

Denmark Wins 2022 European Cyber Security Challenge:
 

« Deploying NDR To Transform Threat Detection
Cyber Threats & Nuclear Fears »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.