Russian Cyberwar Methods Are Evolving

President Vladimir recentlyoffered to end the war in Ukraine if Kyiv agreed to drop its NATO membership ambitions and concede the four provinces of its territory that are claimed and occupied by Russian troops.These terms were swiftly rejected by the democratically elected Ukraine government. 

But the the Russian offer does suggest that they do not see a near term military victory in the disputed territory, and this could be the motive behind an evolution of its cyberwar tactics in the overall military conflict.

In particular, Russian cyber units have started to focus on targets tied to Ukrainian military objectives, trying to hack devices used by Ukrainian soldiers and getting access into command and control systems.This new approach to cyber operations marks a shift from attacking more strategic civilian targets like telecommunications and energy infrastructure.

It does look like that Russia has altered its approach to exploit the type of targets that could provide more direct battlefield advantages, and supporting its ground forces. These new priorities in the conflict may be an indication that they consider their cyber weapons are becoming a more effective alternative to conventional weapons.

While Russia has deployed a sustained campaign against Ukrainian critical infrastructure since the outset of the conflict in 2022, it has achieved no conclusive strategic advantage. Two years later, Russia has recalculated how it is using  its cyber weapons  and sophisticated hacking capabilities to achieve the type of asymmetric advantage which its very high level of capability can deliver. Although there is no sign that Russia has  abandoned its cyber efforts against critical infrastructure, it looks like cyber attacks against such targets are difficult to carry out and do achieve the anticipated results. 

If Russia’s tactical shift has a measurable impact, then it will be guide for how other militaries will start integrating their own cyber capabilities. Their true power may prove to be not as a 'first strike' weapon, but  a 'force multiplier' on the battlefield - a complement that reinforces conventional military operations.

The extent with which this new effort is successful remains to be seen, however, it is evident is that Russia has not achieved what it is wanted with respect to conducting cyber attacks against Ukraine’s critical infrastructures.

Damage and disruption have been caused but little else with respect to getting Ukraine to submit. This evolution plays to those areas in which cyber operations have been most effective -  stealing data, compromising devices, and surveilling targets in advance of conventional attacks.

If that is right, then we can expect that Russia’s new operational concepts will rapidly proliferate outside  Ukraine.

NCSC   |   Reuters   |    Dark Reading   |    RUSI   |   Europan Parliament   |   Oodaloop   

Image: Unsplash

You Might Also Read: 

Stronger Civilian Cyber Defences In Ukraine:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Hothouses In Myanmar
The Paris Olympics: More Than Just Gold Medals Are At Stake »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.