Ukraine’s Cyber Conflict With Russia

Since the invasion of Ukraine there has been a steady stream of disruptive cyber attacks against public services in both Ukraine and Russia with varying degrees of impact. Indeed, Russia has been developing and using offensive cyber capabilities against its perceived adversaries for at least 15 years. 

The first major cyber attack took place in January 2022, and took down more than a dozen of Ukraine's government websites. Around 70 government websites, including the Ministry of Foreign Affairs, the Cabinet of Ministers and the National and Defence Council (NSDC), were attacked however the effects were not major.

Prior to the invasion cyber attacks struck Ukraine and one small country familiar with such tactics rose to Kyiv’s aid - Estonia. The tech-savvy nation of just 1.3 million people, Estonia has become a leader in cyber defence and  NATO’s Cooperative Cyber Defence Centre (CCDCOE) is based in the capital of Tallinn and hosts large cyber defence exercises

On 24 February, Russia launched a full-scale invasion of Ukraine. Western intelligence officials believed that this would be accompanied by a major cyber attack against Ukrainian infrastructure, although this threat did not really materialise. 

Ukrainian Cyber Retaliation 

Cyber attacks on Ukraine have continued during the invasion, but with limited success and independent hacker groups that support Ukraine, such as Anonymous, have launched cyber attacks on Russia in retaliation for the invasion. This invasion was the fourth time Russia has used military force against a neighbour since the end of the Cold War and the seventh time Russia used cyber operations as part of a larger campaign or independently as an instrument of coercion against a neighbouring state.

Hacktivist groups have been using unsophisticated forms of cyber attack, but have successfully temporarily disrupted banks, companies, pharmacies, hospitals, railway networks and civilian government services for Ukrainian and Russian citizens.

Red Cross Hacker Rules

Recently two major hacktivist groups involved in the Ukraine conflict, Killnet and the IT Army of Ukraine, have  pledged to comply with the International Committee of the Red Cross (ICRC) rules for civilian hackers. These rules, dubbed a “Geneva Code of cyberwar,” are designed to reduce cyber attacks that impact civilians. Both groups have been involved in disruptive cyber attacks targeting public services, including hospitals and railways. 

By vowing to comply with the ICRC rules, hacker groups will avoid cyber attacks that affect civilians. By adhering to the ICRC rules, these hacktivist groups aim to avoid attacks that affect civilians and non-military infrastructure. 

The IT Army of Ukraine also said it would be following the ICRC's eight rules. The group, which has 160,000 members on its Telegram channel, also targets public services such as railway systems and banks. However, not all hacktivist groups are expected to follow these rules, and the situation in the region remains complex and volatile. 

Estonia

Estonia has earned its role as a cyber-partner for Ukraine the hard way. In 2007, the highly networked nation faced mass cyber attacks after it decided to remove a monument to the Soviet Army, which occupied Estonia from 1940 to 1991. Some ATMs stopped functioning, government workers were unable to communicate by email, and media outlets were unable to publish their work. 

Since Russia invaded Ukraine, Estonia has seen a decline in cyber attacks and many of the attacks are intended less to actually impede government activities than to demonstrate a political point. Although destructive attacks are most attention-grabbing, Russia’s main cyber activity in Ukraine has probably been focused on intelligence collection. 

Russian hackers have sought to gather data to inform Moscow’s military planning, weapons targeting, occupation activities, influence operations, and future negotiations with Kyiv. However, the various Russian military failures in Ukraine seem to have prevented Moscow from properly leveraging cyber intelligence, at least for now.

CSIS:    Oodaloop:    BBC:     DefenseOne:    Marcus Willet:   Carnegie Endowment:     

Image: David_Underland

You Might Also Read: 

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Legislators Want To Ban Live Facial Recognition
The Duality of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

SpectrumWise

SpectrumWise

SpectrumWise is a business technology specialist that provides Managed Services and Managed Security for small and medium IT Networks.