Russian Cyberwar Methods Are Evolving

President Vladimir recentlyoffered to end the war in Ukraine if Kyiv agreed to drop its NATO membership ambitions and concede the four provinces of its territory that are claimed and occupied by Russian troops.These terms were swiftly rejected by the democratically elected Ukraine government. 

But the the Russian offer does suggest that they do not see a near term military victory in the disputed territory, and this could be the motive behind an evolution of its cyberwar tactics in the overall military conflict.

In particular, Russian cyber units have started to focus on targets tied to Ukrainian military objectives, trying to hack devices used by Ukrainian soldiers and getting access into command and control systems.This new approach to cyber operations marks a shift from attacking more strategic civilian targets like telecommunications and energy infrastructure.

It does look like that Russia has altered its approach to exploit the type of targets that could provide more direct battlefield advantages, and supporting its ground forces. These new priorities in the conflict may be an indication that they consider their cyber weapons are becoming a more effective alternative to conventional weapons.

While Russia has deployed a sustained campaign against Ukrainian critical infrastructure since the outset of the conflict in 2022, it has achieved no conclusive strategic advantage. Two years later, Russia has recalculated how it is using  its cyber weapons  and sophisticated hacking capabilities to achieve the type of asymmetric advantage which its very high level of capability can deliver. Although there is no sign that Russia has  abandoned its cyber efforts against critical infrastructure, it looks like cyber attacks against such targets are difficult to carry out and do achieve the anticipated results. 

If Russia’s tactical shift has a measurable impact, then it will be guide for how other militaries will start integrating their own cyber capabilities. Their true power may prove to be not as a 'first strike' weapon, but  a 'force multiplier' on the battlefield - a complement that reinforces conventional military operations.

The extent with which this new effort is successful remains to be seen, however, it is evident is that Russia has not achieved what it is wanted with respect to conducting cyber attacks against Ukraine’s critical infrastructures.

Damage and disruption have been caused but little else with respect to getting Ukraine to submit. This evolution plays to those areas in which cyber operations have been most effective -  stealing data, compromising devices, and surveilling targets in advance of conventional attacks.

If that is right, then we can expect that Russia’s new operational concepts will rapidly proliferate outside  Ukraine.

NCSC   |   Reuters   |    Dark Reading   |    RUSI   |   Europan Parliament   |   Oodaloop   

Image: Unsplash

You Might Also Read: 

Stronger Civilian Cyber Defences In Ukraine:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Hothouses In Myanmar
The Paris Olympics: More Than Just Gold Medals Are At Stake »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.