Cyber Security Lessons From The Ukraine War

After a lengthy military buildup on Ukraine’s borders, on 24 February 2022, Russian President  Putin finally ordered Russian troops to invade Ukraine and as the war escalates, cyber security has grown in significance. 

Numerous organisations, commercial businesses and many individuals are taking action in defence of Ukraine  by contributing various technological resources in which cyber security playa a vital role. 

According to US and UK government assessments, the Russian offensive has a major cyber component that could potentially affect parties in multiple locations, including Ukraine, NATO countries, and their allies.  Indeed, by the beginning of March 2022, before the military campaign began, there had been over 150 cyber attacks on Ukraine. Microsoft's Threat Intelligence Center (MSTIC) reports that it detected "destructive cyberattacks directed against Ukraine's digital infrastructure" hours before the first launch of missiles or movement of tanks. 

Over a few weeks the conflict has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyber attacks on computer networks and Internet-based disinformation campaigns. 

Cyber security in space is another emerging front. Since the end of the  Cold War, Russia, NATO, and the United States have favoured cooperation in this arena while retaining neutrality, however, space is likely to be the next focus of cyber warfare, with many potential threats such as hacking satellites

The current conflict highlights how important it is  for companies, organisations  and even entire nations  to secure their networks.

As security experts have been monitoring Russia’s cyber activity for years, various hacker groups, like Anonymous, are now actively participating in the conflict. This is a new phenomenon concerning hacker groups, which are actually expanding the battlefield out of geographical boundaries. Streaming and television services were also targeted as part of the attack and even the Kremlin’s main website was hacked.

Cyber attacks on Ukrainian have including the financial sector, agriculture, emergency response services, humanitarian aid efforts, as well as the energy sector organisations and enterprises. 

At a personal level, citizens are also learning that it is essential to perform multiple authentication procedures, change passwords frequently, and restrict access to information, since today, it is clear that one mistake is enough to bring down an entire security system. 

Other types of cyberwar are more open and official. Meta, the company that owns Facebook, has blocked some Russian media on its platforms. In retaliation, Russia has limited access to Facebook.

All these attacks are essentially attacks on civilians  and raise serious concerns under the Geneva Convention. 

Defacement attacks that delete information on websites or change the information that appears there are a basic misinformation tactic that can mislead the general public into thinking fake information is reliable.  It's one of the oldest  tactics of warfare, when actors in a war flood a civilian population with misleading information and ts effect is largely psychological, but very powerful.

Microsoft:     I-HLS:      Harvard Business Review:    Accenture:     DW

You Might Also Read:

The App At The  Frontline Of Information Warfare:

 

« The Pentagon Gets $250m Extra To Spend On AI
Multimillion-Dollar Business Email Fraud Gang Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.

CyPro

CyPro

CyPro is a cyber security expert firm that specialises in providing cyber security services tailored for high-growth companies at every stage of their journey.

BlackSwan Technologies

BlackSwan Technologies

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies.