Russian Cyberwar Methods Are Evolving

President Vladimir recentlyoffered to end the war in Ukraine if Kyiv agreed to drop its NATO membership ambitions and concede the four provinces of its territory that are claimed and occupied by Russian troops.These terms were swiftly rejected by the democratically elected Ukraine government. 

But the the Russian offer does suggest that they do not see a near term military victory in the disputed territory, and this could be the motive behind an evolution of its cyberwar tactics in the overall military conflict.

In particular, Russian cyber units have started to focus on targets tied to Ukrainian military objectives, trying to hack devices used by Ukrainian soldiers and getting access into command and control systems.This new approach to cyber operations marks a shift from attacking more strategic civilian targets like telecommunications and energy infrastructure.

It does look like that Russia has altered its approach to exploit the type of targets that could provide more direct battlefield advantages, and supporting its ground forces. These new priorities in the conflict may be an indication that they consider their cyber weapons are becoming a more effective alternative to conventional weapons.

While Russia has deployed a sustained campaign against Ukrainian critical infrastructure since the outset of the conflict in 2022, it has achieved no conclusive strategic advantage. Two years later, Russia has recalculated how it is using  its cyber weapons  and sophisticated hacking capabilities to achieve the type of asymmetric advantage which its very high level of capability can deliver. Although there is no sign that Russia has  abandoned its cyber efforts against critical infrastructure, it looks like cyber attacks against such targets are difficult to carry out and do achieve the anticipated results. 

If Russia’s tactical shift has a measurable impact, then it will be guide for how other militaries will start integrating their own cyber capabilities. Their true power may prove to be not as a 'first strike' weapon, but  a 'force multiplier' on the battlefield - a complement that reinforces conventional military operations.

The extent with which this new effort is successful remains to be seen, however, it is evident is that Russia has not achieved what it is wanted with respect to conducting cyber attacks against Ukraine’s critical infrastructures.

Damage and disruption have been caused but little else with respect to getting Ukraine to submit. This evolution plays to those areas in which cyber operations have been most effective -  stealing data, compromising devices, and surveilling targets in advance of conventional attacks.

If that is right, then we can expect that Russia’s new operational concepts will rapidly proliferate outside  Ukraine.

NCSC   |   Reuters   |    Dark Reading   |    RUSI   |   Europan Parliament   |   Oodaloop   

Image: Unsplash

You Might Also Read: 

Stronger Civilian Cyber Defences In Ukraine:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Hothouses In Myanmar
The Paris Olympics: More Than Just Gold Medals Are At Stake »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Cybots

Cybots

Cybots is a multinational cyber defence brand founded in Singapore in 2018 to help organizations stay ahead of increasingly sophisticated threats from cyber criminals.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.