Cyber Security Lessons From The Ukraine War

After a lengthy military buildup on Ukraine’s borders, on 24 February 2022, Russian President  Putin finally ordered Russian troops to invade Ukraine and as the war escalates, cyber security has grown in significance. 

Numerous organisations, commercial businesses and many individuals are taking action in defence of Ukraine  by contributing various technological resources in which cyber security playa a vital role. 

According to US and UK government assessments, the Russian offensive has a major cyber component that could potentially affect parties in multiple locations, including Ukraine, NATO countries, and their allies.  Indeed, by the beginning of March 2022, before the military campaign began, there had been over 150 cyber attacks on Ukraine. Microsoft's Threat Intelligence Center (MSTIC) reports that it detected "destructive cyberattacks directed against Ukraine's digital infrastructure" hours before the first launch of missiles or movement of tanks. 

Over a few weeks the conflict has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyber attacks on computer networks and Internet-based disinformation campaigns. 

Cyber security in space is another emerging front. Since the end of the  Cold War, Russia, NATO, and the United States have favoured cooperation in this arena while retaining neutrality, however, space is likely to be the next focus of cyber warfare, with many potential threats such as hacking satellites

The current conflict highlights how important it is  for companies, organisations  and even entire nations  to secure their networks.

As security experts have been monitoring Russia’s cyber activity for years, various hacker groups, like Anonymous, are now actively participating in the conflict. This is a new phenomenon concerning hacker groups, which are actually expanding the battlefield out of geographical boundaries. Streaming and television services were also targeted as part of the attack and even the Kremlin’s main website was hacked.

Cyber attacks on Ukrainian have including the financial sector, agriculture, emergency response services, humanitarian aid efforts, as well as the energy sector organisations and enterprises. 

At a personal level, citizens are also learning that it is essential to perform multiple authentication procedures, change passwords frequently, and restrict access to information, since today, it is clear that one mistake is enough to bring down an entire security system. 

Other types of cyberwar are more open and official. Meta, the company that owns Facebook, has blocked some Russian media on its platforms. In retaliation, Russia has limited access to Facebook.

All these attacks are essentially attacks on civilians  and raise serious concerns under the Geneva Convention. 

Defacement attacks that delete information on websites or change the information that appears there are a basic misinformation tactic that can mislead the general public into thinking fake information is reliable.  It's one of the oldest  tactics of warfare, when actors in a war flood a civilian population with misleading information and ts effect is largely psychological, but very powerful.

Microsoft:     I-HLS:      Harvard Business Review:    Accenture:     DW

You Might Also Read:

The App At The  Frontline Of Information Warfare:

 

« The Pentagon Gets $250m Extra To Spend On AI
Multimillion-Dollar Business Email Fraud Gang Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.