Russia’s Cyber Strategy

Cyber warfare is often described as an integral part of future wars. Some states have adapted to this reality already, while others struggle.

In particular, the use of cyber weapons has proven to have a profound impact on operational reality of the war in Ukraine. A good example is the hacktivist attacks that have occurred which have set a dangerous precedent for both cyber norms and infrastructure security. 

The Russian Federation’s willingness to engage in offensive cyber operations has caused enormous harm, including massive financial losses, interruptions to the operation of critical infrastructure, and disruptions of crucial software supply chains. 

The variety and frequency of these operations, as well as the resulting attribution efforts, have offered an unusually vivid picture of Russia’s cyber capabilities and tactics. While many other countries have relied heavily on vague strategies and threats to signal their emerging cyber powers, Russia has exercised its technical capabilities with relative impunity for more than a decade. 

Russia’s increasingly hostile activities in the cyber sphere have lent new urgency to the cyber security debate in the West and some cyber crime groups have pledged support for the Russian government.  However, what Russia really thinks about cyberspace and exactly what Russia gets up to in this realm is shrouded in mystery

Russian cyber crime groups have threatened to conduct cyber operations in retaliation for perceived cyber offensives against the Russian government or the Russian people. Some groups have also threatened to conduct cyber operations against countries and organizations providing materiel support to Ukraine. Other cyber crime groups have recently conducted disruptive attacks against Ukrainian websites, in support of the Russian military offensive. 

On April 20, 2022, the cyber security authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom released a joint Cybersecurity Advisory to warn organisations that Russia’s invasion of Ukraine could expose organisations both within and beyond the region to increased malicious cyber activity. This activity may occur as a response to the unprecedented economic costs imposed on Russia as well as materiel support provided by the United States and U.S. allies and partners. 

The Russian cyber challenge is not new. The first known cyber attacks initiated by Moscow against the US military date from 1986. 

At the time, the Soviet Union, working in collaboration with the East German secret services, acted through West German cyber proxies. Realising the value and the low cost of remotely-conducted cyber intrusions, Russia sought to overcome its ‘cyber-laggard’ status already in the 1990s, and despite the economic crisis afflicting the country at that time began to develop a sophisticated arsenal of cyber espionage tools.

The roots of Russia’s global cyber power lie in its expertise in intelligence gathering as well as in Russian domestic politics. 

From the early 2000s Russia invested in cyber capabilities to combat Chechen online information campaigns as well as to monitor, disrupt or crack down on the online activism of various Russian opposition groups and independent media. Cooperation began between the Russian state and proxy cyber-activists, or ‘patriotic hackers’, as Vladimir Putin once called them, started to develop. This modus operandi was created domestically during the Chechen war, when snooping and dis-information campaigns were coordinated in a systematic way for the first time; trolls and bots were deployed; but from the late 2000s and early 2010s started to be applied internationally 

Russia is certainly one of the world’s great cyber powers - it has extremely sophisticated capabilities, and has integrated cyber tools in its foreign and security policy much more extensively than other international players. 

The high-profile publicity that Russia has received in recent years because of its cyber operations has also spurred NATO and the EU to invest much more intensively in cyber security, which is likely to result in an escalation of defensive cyber activities vis-à-vis Russia. It has also led the US and many European states to adopt more assertive cyber strategies.

All of this means that Russia’s strategic ‘cyber holiday’ is now over and we have entered a new, much more contested phase of cyber geopolitics where the great cyber powers will henceforth adopt a more aggressive, ‘gloves-off’ approach.

Russia has found a place in its political-military chain of command for cyber warfare and in a domain of conflict characterised by shades of grey, their engagement  with  information warfare is unceasing.

CISA:    Stanislav Secrieru:    The Register:   Small Wars Journal:   FPRI:     Chatham House

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« The Dangers Of Inadequate Data Disposal
Under Pressure - Can CISOs Avoid Burnout? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Rakuten Maritime

Rakuten Maritime

Rakuten Maritime is your trusted partner in maritime cybersecurity, offering comprehensive and proactive solutions tailored to every stage of a ship’s life cycle.

Prismo Systems

Prismo Systems

Prismo provides a unified platform to secure software development across the entire SDLC and deployment on any cloud or on-premises infrastructure.