The Use Of Intellectual Property As An Instrument Of War

Since the beginning of the Russian invasion, Ukraine put together a team of volunteer hackers to conduct offensive operations and now, in response the the Russian invasion the Ukraine Ministry of Defence of Ukraine (GURMO) has leaked  critical documents about  the Russian Beloyarsk Nuclear Power Station which were stolen by the hackers. 

The act is believed to be the first time a hacked data has been leaked as an instrument of war to harm a nation.

GURMO has leaked a broad set of documents to writer Jeffery Carr, author of the book "Inside Cyber Warfare" to disseminate through his subscriber newsletter.  Beloyarsk's trade secrets may be valuable as it is home to the only two fast-breed nuclear reactors in commercial operation, the BN-600 and BN-800. Beloyarsk is run by the Rosenergoatom, the Russian state nuclear utility. Damaging their ability to do business is both an economic strike and an embarrassment for the broader nation as the leaks to Carr were done in a government ministry's name. 

While this is likely the first such use of intellectual property to damage a nation, especially during a combat situation, hack-and-leak operations are not an entirely new tool for nation-states. 

Leaks are often used as a sub-war way to needle adversaries, like when North Korea leaked documents from Sony Entertainment in its retaliation for the Kim Jung-un assassination comedy "The Interview," and Russia leaking emails from high-ranking Democrats in the run-up to the 2016 election. The release of the Beloyarsk documents dent Russia in a variety of ways. Immediately it tells Russia that intelligence has access to various pieces of infrastructure. It embarrasses a country that likes to boast about its scientific might. 

Hack-and-leak IP operations may offer one other substantial benefit and send a strong signal to critical infrastructure without actually harming people by damaging critical infrastructure.

One significant effect of Russia’s invasion of Ukraine is that it has prompted a significant rethink of military strategy, both for the EU and for NATO, with the security threats presented by Moscow’s unexpected military aggression the most pressing issue

Euractiv EU:    SC Magazine:      Jeffrey Car / Substack:      The Conversation:    Daily Advent:  

You Might Also Read: 

Cyber Threats & Nuclear Dangers:

 

« LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks
The Global Cyber Security Market Set To Grow By $190 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.