Russia’s Cyber Strategy

Cyber warfare is often described as an integral part of future wars. Some states have adapted to this reality already, while others struggle.

In particular, the use of cyber weapons has proven to have a profound impact on operational reality of the war in Ukraine. A good example is the hacktivist attacks that have occurred which have set a dangerous precedent for both cyber norms and infrastructure security. 

The Russian Federation’s willingness to engage in offensive cyber operations has caused enormous harm, including massive financial losses, interruptions to the operation of critical infrastructure, and disruptions of crucial software supply chains. 

The variety and frequency of these operations, as well as the resulting attribution efforts, have offered an unusually vivid picture of Russia’s cyber capabilities and tactics. While many other countries have relied heavily on vague strategies and threats to signal their emerging cyber powers, Russia has exercised its technical capabilities with relative impunity for more than a decade. 

Russia’s increasingly hostile activities in the cyber sphere have lent new urgency to the cyber security debate in the West and some cyber crime groups have pledged support for the Russian government.  However, what Russia really thinks about cyberspace and exactly what Russia gets up to in this realm is shrouded in mystery

Russian cyber crime groups have threatened to conduct cyber operations in retaliation for perceived cyber offensives against the Russian government or the Russian people. Some groups have also threatened to conduct cyber operations against countries and organizations providing materiel support to Ukraine. Other cyber crime groups have recently conducted disruptive attacks against Ukrainian websites, in support of the Russian military offensive. 

On April 20, 2022, the cyber security authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom released a joint Cybersecurity Advisory to warn organisations that Russia’s invasion of Ukraine could expose organisations both within and beyond the region to increased malicious cyber activity. This activity may occur as a response to the unprecedented economic costs imposed on Russia as well as materiel support provided by the United States and U.S. allies and partners. 

The Russian cyber challenge is not new. The first known cyber attacks initiated by Moscow against the US military date from 1986. 

At the time, the Soviet Union, working in collaboration with the East German secret services, acted through West German cyber proxies. Realising the value and the low cost of remotely-conducted cyber intrusions, Russia sought to overcome its ‘cyber-laggard’ status already in the 1990s, and despite the economic crisis afflicting the country at that time began to develop a sophisticated arsenal of cyber espionage tools.

The roots of Russia’s global cyber power lie in its expertise in intelligence gathering as well as in Russian domestic politics. 

From the early 2000s Russia invested in cyber capabilities to combat Chechen online information campaigns as well as to monitor, disrupt or crack down on the online activism of various Russian opposition groups and independent media. Cooperation began between the Russian state and proxy cyber-activists, or ‘patriotic hackers’, as Vladimir Putin once called them, started to develop. This modus operandi was created domestically during the Chechen war, when snooping and dis-information campaigns were coordinated in a systematic way for the first time; trolls and bots were deployed; but from the late 2000s and early 2010s started to be applied internationally 

Russia is certainly one of the world’s great cyber powers - it has extremely sophisticated capabilities, and has integrated cyber tools in its foreign and security policy much more extensively than other international players. 

The high-profile publicity that Russia has received in recent years because of its cyber operations has also spurred NATO and the EU to invest much more intensively in cyber security, which is likely to result in an escalation of defensive cyber activities vis-à-vis Russia. It has also led the US and many European states to adopt more assertive cyber strategies.

All of this means that Russia’s strategic ‘cyber holiday’ is now over and we have entered a new, much more contested phase of cyber geopolitics where the great cyber powers will henceforth adopt a more aggressive, ‘gloves-off’ approach.

Russia has found a place in its political-military chain of command for cyber warfare and in a domain of conflict characterised by shades of grey, their engagement  with  information warfare is unceasing.

CISA:    Stanislav Secrieru:    The Register:   Small Wars Journal:   FPRI:     Chatham House

You Might Also Read: 

The Cyber Security Top Ten Power List:

 

« The Dangers Of Inadequate Data Disposal
Under Pressure - Can CISOs Avoid Burnout? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.