Cyber Security Lessons From The Ukraine War

After a lengthy military buildup on Ukraine’s borders, on 24 February 2022, Russian President  Putin finally ordered Russian troops to invade Ukraine and as the war escalates, cyber security has grown in significance. 

Numerous organisations, commercial businesses and many individuals are taking action in defence of Ukraine  by contributing various technological resources in which cyber security playa a vital role. 

According to US and UK government assessments, the Russian offensive has a major cyber component that could potentially affect parties in multiple locations, including Ukraine, NATO countries, and their allies.  Indeed, by the beginning of March 2022, before the military campaign began, there had been over 150 cyber attacks on Ukraine. Microsoft's Threat Intelligence Center (MSTIC) reports that it detected "destructive cyberattacks directed against Ukraine's digital infrastructure" hours before the first launch of missiles or movement of tanks. 

Over a few weeks the conflict has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyber attacks on computer networks and Internet-based disinformation campaigns. 

Cyber security in space is another emerging front. Since the end of the  Cold War, Russia, NATO, and the United States have favoured cooperation in this arena while retaining neutrality, however, space is likely to be the next focus of cyber warfare, with many potential threats such as hacking satellites

The current conflict highlights how important it is  for companies, organisations  and even entire nations  to secure their networks.

As security experts have been monitoring Russia’s cyber activity for years, various hacker groups, like Anonymous, are now actively participating in the conflict. This is a new phenomenon concerning hacker groups, which are actually expanding the battlefield out of geographical boundaries. Streaming and television services were also targeted as part of the attack and even the Kremlin’s main website was hacked.

Cyber attacks on Ukrainian have including the financial sector, agriculture, emergency response services, humanitarian aid efforts, as well as the energy sector organisations and enterprises. 

At a personal level, citizens are also learning that it is essential to perform multiple authentication procedures, change passwords frequently, and restrict access to information, since today, it is clear that one mistake is enough to bring down an entire security system. 

Other types of cyberwar are more open and official. Meta, the company that owns Facebook, has blocked some Russian media on its platforms. In retaliation, Russia has limited access to Facebook.

All these attacks are essentially attacks on civilians  and raise serious concerns under the Geneva Convention. 

Defacement attacks that delete information on websites or change the information that appears there are a basic misinformation tactic that can mislead the general public into thinking fake information is reliable.  It's one of the oldest  tactics of warfare, when actors in a war flood a civilian population with misleading information and ts effect is largely psychological, but very powerful.

Microsoft:     I-HLS:      Harvard Business Review:    Accenture:     DW

You Might Also Read:

The App At The  Frontline Of Information Warfare:

 

« The Pentagon Gets $250m Extra To Spend On AI
Multimillion-Dollar Business Email Fraud Gang Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

SkOUT Secure Intelligence

SkOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.