NATO Prepares For Cyber Warfare

This month, NATO engaged its cyber forces in Cyber Coalition 2022, a cyber exercise in Estonia simulating a cyber attack on a fictional island to prepare for anticipated cyberwar.  As conflicts have morphed from traditional military methods into the complex domain of cyberspace, around 150 NATO cyber security experts convened in Tallin to prepare for an anticipated cyberwar. 

The Cyber Coalition 2020 exercise involved more than 40 member states, allies and other organisations working  together to respond to and recover from, simulated cyber attacks on critical infrastructure like power grids and ships. The exercise spanned the globe, with nearly 1,000 cyber professionals participating remotely from their home countries.

In particular, NATO is closely monitoring the war in Ukraine, to help Ukraine and make it harder for Russia and other adversaries to hack into infrastructure in NATO member states and their allies.

Recently, hackers affiliated with Russian military intelligence launched destructive malware attacks against energy, water, and other critical infrastructure in Ukraine, simultaneously with missile strikes aimed at destroying power and water supplies to civilians across the country.  Russian hackers have also attacked in Poland, targeting a critical logistics hub, in a possible attempt to disrupt the movement of weapons and supplies.

On the information warfare front, Russia has increased the intensity of popular dissent over energy and inflation across Europe by boosting select narratives online through state-affiliated media outlets and social media accounts to undermine elected officials and democratic institutions.  So far this propaganda has had only limited public impact, but they foreshadow what may become broadening tactics during the winter ahead.

The world has never experienced an all-out cyberwar in which cyber attacks are used to the same devastating effect as physical strikes, such as shutting off critical services like power and water and preventing their restoration. 

NATO has been intentionally ambiguous about what level of cyber attack it would take for members to respond with either force or devastating cyber strikes of their own. The coalition’s cyber experts have been closely monitoring the war to learn lessons to prepare member states against cyber attacks carried out by adversaries. 

NATO is also reviewing how vulnerable their critical networks in NATO states are to cyber attacks. Those can run from sophisticated operations to plant malware on software updates to more common ransomware attacks.

The intensified pressure on cyber professionals within NATO countries and allied nations has made the ability to coordinate and test communication protocols essential. Both Finland and Sweden, have discarded their previous neutrality to apply for NATO membership and were included in the exercise. However, separate reports suggest that, despite the unprecedented intensity of cyber-attacks launched by Russia over the past few months, Ukrainians have defended remarkably well – learning the lessons from previous attacks on critical infrastructure in December 2015 and 2016.

What has not been so well analysed are the implications of the war in Ukraine for NATO force's preparations for fighting a future “great-power war.” Moscow’s major invasion of Ukraine is the first open war of this era and, like the Spanish Civil War which preceded World War 2, may prove to be a testing ground of operations and tactics for future conflicts. 

Politico:      Al Mayadeen:      Microsoft:      Infosecurity Magazine:    Just Security:    Yahoo:  

You Might Also Read: 

Denmark Wins 2022 European Cyber Security Challenge:
 

« Deploying NDR To Transform Threat Detection
Cyber Threats & Nuclear Fears »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.