NATO Prepares For Cyber Warfare

This month, NATO engaged its cyber forces in Cyber Coalition 2022, a cyber exercise in Estonia simulating a cyber attack on a fictional island to prepare for anticipated cyberwar.  As conflicts have morphed from traditional military methods into the complex domain of cyberspace, around 150 NATO cyber security experts convened in Tallin to prepare for an anticipated cyberwar. 

The Cyber Coalition 2020 exercise involved more than 40 member states, allies and other organisations working  together to respond to and recover from, simulated cyber attacks on critical infrastructure like power grids and ships. The exercise spanned the globe, with nearly 1,000 cyber professionals participating remotely from their home countries.

In particular, NATO is closely monitoring the war in Ukraine, to help Ukraine and make it harder for Russia and other adversaries to hack into infrastructure in NATO member states and their allies.

Recently, hackers affiliated with Russian military intelligence launched destructive malware attacks against energy, water, and other critical infrastructure in Ukraine, simultaneously with missile strikes aimed at destroying power and water supplies to civilians across the country.  Russian hackers have also attacked in Poland, targeting a critical logistics hub, in a possible attempt to disrupt the movement of weapons and supplies.

On the information warfare front, Russia has increased the intensity of popular dissent over energy and inflation across Europe by boosting select narratives online through state-affiliated media outlets and social media accounts to undermine elected officials and democratic institutions.  So far this propaganda has had only limited public impact, but they foreshadow what may become broadening tactics during the winter ahead.

The world has never experienced an all-out cyberwar in which cyber attacks are used to the same devastating effect as physical strikes, such as shutting off critical services like power and water and preventing their restoration. 

NATO has been intentionally ambiguous about what level of cyber attack it would take for members to respond with either force or devastating cyber strikes of their own. The coalition’s cyber experts have been closely monitoring the war to learn lessons to prepare member states against cyber attacks carried out by adversaries. 

NATO is also reviewing how vulnerable their critical networks in NATO states are to cyber attacks. Those can run from sophisticated operations to plant malware on software updates to more common ransomware attacks.

The intensified pressure on cyber professionals within NATO countries and allied nations has made the ability to coordinate and test communication protocols essential. Both Finland and Sweden, have discarded their previous neutrality to apply for NATO membership and were included in the exercise. However, separate reports suggest that, despite the unprecedented intensity of cyber-attacks launched by Russia over the past few months, Ukrainians have defended remarkably well – learning the lessons from previous attacks on critical infrastructure in December 2015 and 2016.

What has not been so well analysed are the implications of the war in Ukraine for NATO force's preparations for fighting a future “great-power war.” Moscow’s major invasion of Ukraine is the first open war of this era and, like the Spanish Civil War which preceded World War 2, may prove to be a testing ground of operations and tactics for future conflicts. 

Politico:      Al Mayadeen:      Microsoft:      Infosecurity Magazine:    Just Security:    Yahoo:  

You Might Also Read: 

Denmark Wins 2022 European Cyber Security Challenge:
 

« Deploying NDR To Transform Threat Detection
Cyber Threats & Nuclear Fears »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.

MirrorTab

MirrorTab

MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware.