Russian Cyberwar Methods Are Evolving

President Vladimir recentlyoffered to end the war in Ukraine if Kyiv agreed to drop its NATO membership ambitions and concede the four provinces of its territory that are claimed and occupied by Russian troops.These terms were swiftly rejected by the democratically elected Ukraine government. 

But the the Russian offer does suggest that they do not see a near term military victory in the disputed territory, and this could be the motive behind an evolution of its cyberwar tactics in the overall military conflict.

In particular, Russian cyber units have started to focus on targets tied to Ukrainian military objectives, trying to hack devices used by Ukrainian soldiers and getting access into command and control systems.This new approach to cyber operations marks a shift from attacking more strategic civilian targets like telecommunications and energy infrastructure.

It does look like that Russia has altered its approach to exploit the type of targets that could provide more direct battlefield advantages, and supporting its ground forces. These new priorities in the conflict may be an indication that they consider their cyber weapons are becoming a more effective alternative to conventional weapons.

While Russia has deployed a sustained campaign against Ukrainian critical infrastructure since the outset of the conflict in 2022, it has achieved no conclusive strategic advantage. Two years later, Russia has recalculated how it is using  its cyber weapons  and sophisticated hacking capabilities to achieve the type of asymmetric advantage which its very high level of capability can deliver. Although there is no sign that Russia has  abandoned its cyber efforts against critical infrastructure, it looks like cyber attacks against such targets are difficult to carry out and do achieve the anticipated results. 

If Russia’s tactical shift has a measurable impact, then it will be guide for how other militaries will start integrating their own cyber capabilities. Their true power may prove to be not as a 'first strike' weapon, but  a 'force multiplier' on the battlefield - a complement that reinforces conventional military operations.

The extent with which this new effort is successful remains to be seen, however, it is evident is that Russia has not achieved what it is wanted with respect to conducting cyber attacks against Ukraine’s critical infrastructures.

Damage and disruption have been caused but little else with respect to getting Ukraine to submit. This evolution plays to those areas in which cyber operations have been most effective -  stealing data, compromising devices, and surveilling targets in advance of conventional attacks.

If that is right, then we can expect that Russia’s new operational concepts will rapidly proliferate outside  Ukraine.

NCSC   |   Reuters   |    Dark Reading   |    RUSI   |   Europan Parliament   |   Oodaloop   

Image: Unsplash

You Might Also Read: 

Stronger Civilian Cyber Defences In Ukraine:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Hothouses In Myanmar
The Paris Olympics: More Than Just Gold Medals Are At Stake »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Federal Office For Information Security (BSI)

Federal Office For Information Security (BSI)

The BSI (Bundesamt fur Sicherheit in der Informationstechnik) is the federal cyber security agency and the chief architect of secure digitalisation in Germany.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.